Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10/10/2024, 17:12

General

  • Target

    b89a432e0cbcb7773a1d8f852beeb811760f6489cf1ceddd0834fcf811cd8252N.exe

  • Size

    69KB

  • MD5

    e2aad802d2e55308b85a4fd6dc6dbe60

  • SHA1

    22c5577e977c7ea045b2ed0846e569045764c43e

  • SHA256

    b89a432e0cbcb7773a1d8f852beeb811760f6489cf1ceddd0834fcf811cd8252

  • SHA512

    9fe326ddd099a9352cc35019ce97b69b90c473ae4a0e0239bf4fa2c78b64586f88253ae0f80b13ecc2d2ad890d2b7becc0930c81267e51739e3af25a28ed0dca

  • SSDEEP

    1536:V7Zf/FAxTWoJJ7TPU2XPYFbIhbaJuYnQ1v:fny1zU2Wc

Malware Config

Signatures

  • Renames multiple (3200) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b89a432e0cbcb7773a1d8f852beeb811760f6489cf1ceddd0834fcf811cd8252N.exe
    "C:\Users\Admin\AppData\Local\Temp\b89a432e0cbcb7773a1d8f852beeb811760f6489cf1ceddd0834fcf811cd8252N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4177215427-74451935-3209572229-1000\desktop.ini.tmp

    Filesize

    69KB

    MD5

    8c49a35491eaf15f68bc1ef70113dbaf

    SHA1

    5f931e225f0b2567184e3722e3cf14f82f4a8da2

    SHA256

    0831086df2d303aca2d5f4895b1cd1559e89d469d5a1c856a4edf68592b3dcdc

    SHA512

    d943107971d89f151767302b7977be817696e711cec0b6802366c7d170bab0c546e6cfb5a973e656f49c9e6d0700e32a8ab31963e1f1bf46e69f89c3b526f0fe

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    78KB

    MD5

    2373a88f8fdeba869e5fbd4dacb07982

    SHA1

    cd181365dcc87f02e0b10314954188e3886f0eb3

    SHA256

    219361dfed014a4e4a2dac29bfa3d669921d2f6beadddf43fe30a726b313f6fd

    SHA512

    0c52a3812d745b0f84a442dd1de26911813573b84a9b5728f0688e0e2720a4f6f93958494b7747cd8ecc620842c461cc2e3ac8a21b888bdb8399766858245f39

  • memory/1680-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1680-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB