Analysis

  • max time kernel
    118s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    06/10/2024, 09:49

General

  • Target

    0486a588957cb7f4ecc2e8ad77ee2510ddfc6d37e12e1ab4c80e3b2d7b8c8356N.exe

  • Size

    58KB

  • MD5

    9fcbdf999a0194c94a30fd4ae09902f0

  • SHA1

    62758f43ae7e0d25cef2bea0c51c4159350fde01

  • SHA256

    0486a588957cb7f4ecc2e8ad77ee2510ddfc6d37e12e1ab4c80e3b2d7b8c8356

  • SHA512

    a301e6b4d7dea57376440ab7bdbed119a6109591272e5ccf177826e15ab2a5e3614cf8b6b9a6e510e5f4c54e4a1b90dca627932f4464b82e90f1978801886cb1

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rz:V7Zf/FAxTWbi7UhUoomo4

Malware Config

Signatures

  • Renames multiple (3214) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0486a588957cb7f4ecc2e8ad77ee2510ddfc6d37e12e1ab4c80e3b2d7b8c8356N.exe
    "C:\Users\Admin\AppData\Local\Temp\0486a588957cb7f4ecc2e8ad77ee2510ddfc6d37e12e1ab4c80e3b2d7b8c8356N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2300

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    59KB

    MD5

    60e70bb26477a027216f812eebbd6ab3

    SHA1

    a967f59635ab0044a460fcf76ddf566722f205c1

    SHA256

    7b84c5ff6215e1ad61fd6e9494168ed2922c134fede23c5dd75baa24aed8f89c

    SHA512

    c9c1ad30901e1f16896793b47224cf8ebe3f9c254e485fe54c6ad50953e46ce33dec1eb6ddbdc3f87be61c86e9711f2adede0ce6d13b230c44f051f64575fba7

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    67KB

    MD5

    5cc183047d1fe8c1b95733a874f04f93

    SHA1

    827aa38a2b7d949999dcba5faa06cac11ae0db20

    SHA256

    a1393d60baf4b757e01719841e7426b49484a167eec6b819562bbc9047aa0937

    SHA512

    6f6ecf8b01f46270e17869083c140353a334a8c581c27a088f58f85b694807fed08a90a75fca50ae38665261b792d7b092744504003e7c2cd64264c18d192a3b

  • memory/2300-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2300-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB