Analysis

  • max time kernel
    119s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2024, 15:51

General

  • Target

    b341f4dc5990f878a43a54b977864c265a6d2844eaf7711bc2dda603a2e7d676N.exe

  • Size

    52KB

  • MD5

    050ceaa67849edb7749fa74da41b9790

  • SHA1

    317ea74dcab99ac742efbff3ad26024eeacce276

  • SHA256

    b341f4dc5990f878a43a54b977864c265a6d2844eaf7711bc2dda603a2e7d676

  • SHA512

    f0e70e373479d6c16b061296398b10ad32c767c91837e7e29f991b9d03dc5d64084f5b1160010578fe3e987415a996959126d9a43c1d5daecc30caa044369a0e

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9nPCQIQ5:V7Zf/FAxTWoJJ7Tkpm

Malware Config

Signatures

  • Renames multiple (3147) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b341f4dc5990f878a43a54b977864c265a6d2844eaf7711bc2dda603a2e7d676N.exe
    "C:\Users\Admin\AppData\Local\Temp\b341f4dc5990f878a43a54b977864c265a6d2844eaf7711bc2dda603a2e7d676N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3040

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

          Filesize

          52KB

          MD5

          66966dcd62a27f8dac8f1b0cf861a04d

          SHA1

          b50e463f76527ccd63cb1b07f9aa01ac3415cfaf

          SHA256

          2893163c0f11a549a438135f73ddd746c5ed2ca65bdf8773ab612f453a703da9

          SHA512

          945fee8f66607d36f404b48a3a04125eeafbd63bedaef4054aaf275fb36c73b7964851257726ae7c74955373f5a1d6ab4b3195f6015a7792991d01c5a7dbb694

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          61KB

          MD5

          9f9750c90feb5879d4ff07d7881e5b4b

          SHA1

          90de1bb33ef61d0c42d7fbb8d180ecb02eda1126

          SHA256

          db50d2719697aec647ce94df0e27592b8bf332e1646d5fffbd6ffee51cb3e828

          SHA512

          10be0743cf61692ca3831000aeea183570a902f0541e0355a2e433e5143142d401fb667704644b4efbf03077fa0ecd5c36ba253f906eadb5f8b99b9e620911c6

        • memory/3040-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/3040-70-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB