Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2024, 13:30

General

  • Target

    31eda8376bc61c0958fdb93b65b8b41c23f1b532490ee8e95789337860d56189N.exe

  • Size

    68KB

  • MD5

    b3b7c8acb080a0a9e8582d1d1d235830

  • SHA1

    9e0728b87293e2f9fa568a59ec178038507cadd8

  • SHA256

    31eda8376bc61c0958fdb93b65b8b41c23f1b532490ee8e95789337860d56189

  • SHA512

    39d2d73891735007fecd0c320a39a1f8117e00707ad94e5f548762cf86df5420d93491e4b8e99439918a60f899df0d4fff48683e70c2033959586335007119db

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcwBcCBcw/tio/tiJFEFuod2:V7Zf/FAxTWoJJ7TTQoQPyPheh7

Malware Config

Signatures

  • Renames multiple (3751) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\31eda8376bc61c0958fdb93b65b8b41c23f1b532490ee8e95789337860d56189N.exe
    "C:\Users\Admin\AppData\Local\Temp\31eda8376bc61c0958fdb93b65b8b41c23f1b532490ee8e95789337860d56189N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1860

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-312935884-697965778-3955649944-1000\desktop.ini.tmp

          Filesize

          68KB

          MD5

          b26dcb52c9ec44eba4d47eea6730be23

          SHA1

          0c8986230526b4a0a465d2a7e381b7b62dd0e19f

          SHA256

          865d093af3e757dc38be6219344b95643c331713fc7100bee8dbe99f29bf7aa5

          SHA512

          4e73f2c28ee450aa3619ba607058347d7571223dffc3c2986397a05a028d795c75e6e38d363ccf7767aa1794858832c23340a9c7e824a9a6da6ac47ba7e9bc09

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          77KB

          MD5

          f90beaa4b322804a6f12857da370b5f2

          SHA1

          aa90c2f14d04940404728ec9a8c35a3c2a877250

          SHA256

          6c2b1f1eeb1ad6d49a9e66d0bdf6ecd6a432777c6edaf2a85179056aa7e63985

          SHA512

          c5646bd2aa4d3ff7d3515f0b6f00be5b5df8472c6a5f03deb0d7882abad848a3e4d0873b122d01a6d03a4daa204496a77038d826a3fe33b5827a6bd39577fb20

        • memory/1860-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1860-74-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB