Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2024 18:45

General

  • Target

    2c4e3d0dbf58d48eaf8746eaa95fd811908321ada19616c0311a83cdea14ce81N.exe

  • Size

    56KB

  • MD5

    f689b4f01612802ab400263c4e741f40

  • SHA1

    8da3789a82459bd98eac61eb3d3696a3d78364ff

  • SHA256

    2c4e3d0dbf58d48eaf8746eaa95fd811908321ada19616c0311a83cdea14ce81

  • SHA512

    d1284b68061a188ae16bca445a776d8898498ffe803920d186157f87a589606eac0b7d8b3afe74c4b77bde34561ba806ac466f23ed60017afdfb712abd90c3e6

  • SSDEEP

    1536:V7Zf/FAxTWoJJ7TPUr8p0IhAFV2RuH220IhAFV2RuH24:fny1zUz+6V2RuH2j+6V2RuH24

Malware Config

Signatures

  • Renames multiple (3137) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c4e3d0dbf58d48eaf8746eaa95fd811908321ada19616c0311a83cdea14ce81N.exe
    "C:\Users\Admin\AppData\Local\Temp\2c4e3d0dbf58d48eaf8746eaa95fd811908321ada19616c0311a83cdea14ce81N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3533259084-2542256011-65585152-1000\desktop.ini.tmp

    Filesize

    56KB

    MD5

    84f071cc4bcb1a92ab81f60c8e5fdfb2

    SHA1

    9e74f0e580fa8c88cc1d0e4dfe79200226b7b6b7

    SHA256

    f46860f2ba600a1dd19a96e2317684aa24d048117e18444d6714bd5e172baec1

    SHA512

    b9593c8ae6cca33ca7fe859c1aae10c6928a840973ef2b293a273ef93ba43f2d505562a0fdb2c3812ff6e2535c1e6ad72633482553d9338a68fef571a59a165f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    65KB

    MD5

    e0ec21190dfc120dc68fa036ea62fdbd

    SHA1

    b34fe6de37a3f7343774405a3659bd7ceba051be

    SHA256

    8d40eade20de5e0687e5c771803ba1c8282af2ada23649d01866956e7b9bd361

    SHA512

    ced99b4cecdd8aa0e252bfda6f41ec78d53487efdd19583b40859446e57bad7a860e49ea5113e367d649fa934c227f005e753f047be3e59b9d33455391a97bb0

  • memory/1812-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1812-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB