Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2024, 07:22

General

  • Target

    687e8afa7cd839908206539f7287901c202ea8dc13be21215b7cfaac4818ef2dN.exe

  • Size

    56KB

  • MD5

    1757100879810a12c0ff940436d984c0

  • SHA1

    ce69fc36b7d4b5ea42a4f03a5693cf580e30059a

  • SHA256

    687e8afa7cd839908206539f7287901c202ea8dc13be21215b7cfaac4818ef2d

  • SHA512

    e6c9cd373253c8f9d94d32927df7b0ad9dd226644df395fb733c614a522eb0ff48512f984430cb86158fb3922d3cd430ce27bafc7ca89791cde0abb1f06951d1

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATBHfBo8o3PI:V7Zf/FAxTWoJJZENTBHfiPI

Malware Config

Signatures

  • Renames multiple (3200) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\687e8afa7cd839908206539f7287901c202ea8dc13be21215b7cfaac4818ef2dN.exe
    "C:\Users\Admin\AppData\Local\Temp\687e8afa7cd839908206539f7287901c202ea8dc13be21215b7cfaac4818ef2dN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    56KB

    MD5

    1631288cc46927b7438b7dbbc7459a77

    SHA1

    330e90bdeff380d8079708571e4bd105eefc50a4

    SHA256

    6cea584311ae67f8b27caa90d7979e291a539963f23aabd1079f2ee434fa80f2

    SHA512

    e9fb743909b1e0e2b76154621a810c5861c1423a9eec9a6c0087ead5d83ad7b37d97191f5f0c3c41a6635389f798b5c08fe7d5919e812f8a4436f7d831724ceb

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    65KB

    MD5

    b99edcbb894a15efaad5e38f6f9689de

    SHA1

    b359c458ebf145ba3322b146ccb35fdf52fb2bef

    SHA256

    86ee6bc3d634d8895a16ed35d18e786f74e5bfcfd9aacbb2d246edc3d9001487

    SHA512

    69845f54c70f4a20ccc12ecd7e2dc309425eae036d3ea2b90746a89b364d2e04992acc0263778cec8e3f57332b1e8dfe85c0ed7a96c6517963bfd1c71dfb470c

  • memory/3024-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3024-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB