Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2024, 09:25

General

  • Target

    e625b959089a09d228a608e8b8313087721b4b31532498dd07d379d0255a05b9N.exe

  • Size

    59KB

  • MD5

    15402d5f795833f9a58abe57a3908580

  • SHA1

    a07210b5e993991cce4d2b1081957bef2f88a1e2

  • SHA256

    e625b959089a09d228a608e8b8313087721b4b31532498dd07d379d0255a05b9

  • SHA512

    f696aa6fc8a31068ee64151549647af5bb9f682a45a7a037bdb7fcaa9b2aac735a1b6bbbf48e6a04dd2a40040f245c2f3ee80702b6dcdd6758b1b9c48de4488f

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9woOzOuiJfoOzOuiJfEhk:V7Zf/FAxTWoJJ7T4MxhHA3EgKtW5B

Malware Config

Signatures

  • Renames multiple (3682) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e625b959089a09d228a608e8b8313087721b4b31532498dd07d379d0255a05b9N.exe
    "C:\Users\Admin\AppData\Local\Temp\e625b959089a09d228a608e8b8313087721b4b31532498dd07d379d0255a05b9N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2520

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    60KB

    MD5

    dc995479b99dd346d35b80cfd8d33008

    SHA1

    9a17c7e37711aa83ef6bba8d00abe31cf2a75bfe

    SHA256

    75e3f3c58e651679df2fd6cd10bbe5beeec8e3d7391b407150e98bcffbfaa437

    SHA512

    75f4586b8cacc5deabe71a30b14e32058685915473bffd42ce69439bb3799b11dee40791567ac5dc30b6f05716e83c20acd9feaab35ec0db594742a4014bf27a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    69KB

    MD5

    bd39eab6584db3c63f2e3a76acbd6654

    SHA1

    abdf8e583547f1542f9a951b354fe944c72b51f4

    SHA256

    fa70c7d7594f97a0cfcff77e10a72d7295348278b35f180ee90d66d474275c6d

    SHA512

    74dd885d727813c1dcab7507479f9c40a0407e5e4cdb3f892fe9e4a810d893c50d2c46daee84693808343b6cca2ac6808660a79d8c93bef23d7cc2fc0d79f456

  • memory/2520-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2520-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB