Analysis

  • max time kernel
    120s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    04-10-2024 18:04

General

  • Target

    40f43363b314535479d5e7accb80d1daa364de7370f4d23e108b8346450e40c3N.exe

  • Size

    62KB

  • MD5

    c72f32078c5f064f491a66614f01f1c0

  • SHA1

    91ac450f835b162c9d5acf4f7d57facbe61c7593

  • SHA256

    40f43363b314535479d5e7accb80d1daa364de7370f4d23e108b8346450e40c3

  • SHA512

    0521007872b5ab284ac503f714830e4e945968bb80e0325ada8c60ff1c7cbe0c56223c3bcb36ea40b8635685bcf5ebcfffc6aa9ccac87d20a879eb599f6cd74d

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTBAOIfmKJfmKMTNT9:fny1tE7

Malware Config

Signatures

  • Renames multiple (3156) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\40f43363b314535479d5e7accb80d1daa364de7370f4d23e108b8346450e40c3N.exe
    "C:\Users\Admin\AppData\Local\Temp\40f43363b314535479d5e7accb80d1daa364de7370f4d23e108b8346450e40c3N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    62KB

    MD5

    2678268d20f2529d56b13ff6b5ecc732

    SHA1

    a3b113f4cc5555864994919947a04f77051e62c7

    SHA256

    f65e1a08d0d17349c964e0842207f6324d769088cf1fe471e45a4509086e2427

    SHA512

    a03c5bff96333c52eef9c9d239423b3a20810d2da39ed854e4ace29d3711978f9eb50d74e912c4898bf3a1fe49293a75cc1c9d411ea9db0a595c2ac0601e1482

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    71KB

    MD5

    27bdcf50600e69445f290d1d58b65505

    SHA1

    91fbd6dd8ae93cd514bceaba89c8ffdadd7170ba

    SHA256

    ccb4a7e454e8e7da4fd02b5c4d30a5a5c62a4b3dfb7f3ab31001864020fda277

    SHA512

    fa3128720c699436123f5b8c9ca3bf0e63ec08aa306d0ac0525695bf9b21c1f466db62965e27f32184702acd0d8619cb3399db695c72021145f96633297f3395

  • memory/2640-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2640-72-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB