Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2024 06:56

General

  • Target

    2ea19290113f159463b5a50154419d4cc91a3bde3a1a525741f2f4b536048a46N.exe

  • Size

    45KB

  • MD5

    71d2c4f10b0c489037b636b34bb839e0

  • SHA1

    9050cec1f815b738cda6727b7ca657ad9a1010ba

  • SHA256

    2ea19290113f159463b5a50154419d4cc91a3bde3a1a525741f2f4b536048a46

  • SHA512

    27caa7f5e5744c834c931b37a918233e50547a8ff5d6a8ab0ff99636ded6928b6794a36e7883f78def47307ada9491b3001598e37fcf33c11b169d88b207bed4

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcwBcCBcw/tio/tiJFEFuodcOZiJSQOQiJfodcOf:CTW7JJ7TTQoQPyPhehd

Malware Config

Signatures

  • Renames multiple (3687) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ea19290113f159463b5a50154419d4cc91a3bde3a1a525741f2f4b536048a46N.exe
    "C:\Users\Admin\AppData\Local\Temp\2ea19290113f159463b5a50154419d4cc91a3bde3a1a525741f2f4b536048a46N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2039016743-699959520-214465309-1000\desktop.ini.tmp

    Filesize

    45KB

    MD5

    c62bcb50ff7a8e776c9f8c8bf7a8491b

    SHA1

    d2e16076070d3a2c6cd2c770ff19c22b59b0e0ae

    SHA256

    dba833c25be8b733917061c01c875824a04363b76822505c9a7903a56891a345

    SHA512

    1fd16ebe26a2d881291352d857077dd045de8872b62e8a872383ee77dabf15b77cfeb218a2a2b9eaa46cff673106330ae34e3bed00f1906b7f1da5fe13fd2c84

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    54KB

    MD5

    ee5152272ef2d3ef156e78cec55376ef

    SHA1

    f19775296702faf01b3cd863200ce265cdb0134e

    SHA256

    c45108c5cf51e6fcdeeea845f79a886cbf5ddaa57ae1242c6b2b889b92cc64e0

    SHA512

    68ef054922b2d82f380b44d5189e48c032ccd46c1a6d57e7ce6cd58dd92f483cc20e0039e2e2d9985827a76846ad1a97e55ee66a5b9b96e72cd38f085fae7894

  • memory/2372-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2372-72-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB