Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2024, 11:02

General

  • Target

    3da3f3eaf3263990795421a14c8dcd7f0ce902c98705d310efcdc34bd12a70b1N.exe

  • Size

    60KB

  • MD5

    3fd37e23c76b7a29088d773be0f3f480

  • SHA1

    7b36c532fe3d693aa089690b7188721c63e9e2f3

  • SHA256

    3da3f3eaf3263990795421a14c8dcd7f0ce902c98705d310efcdc34bd12a70b1

  • SHA512

    e2178e241d6c6db02f9ce36466c6a210bbbece0ee52c0f9d908c72ae2c98100eba69d265cbd9c7919b88188ec294f66d8a1b854fe8a18492f0a34e7d4a66e631

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATBHfBo8o3PIJIhF:V7Zf/FAxTWoJJZENTBHfiPIJIhJIo

Malware Config

Signatures

  • Renames multiple (3273) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3da3f3eaf3263990795421a14c8dcd7f0ce902c98705d310efcdc34bd12a70b1N.exe
    "C:\Users\Admin\AppData\Local\Temp\3da3f3eaf3263990795421a14c8dcd7f0ce902c98705d310efcdc34bd12a70b1N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2096

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3533259084-2542256011-65585152-1000\desktop.ini.tmp

    Filesize

    60KB

    MD5

    2a72265042213792a7d6df0dd3b5744a

    SHA1

    3dd1f46103d73cc1662bb3976225158b8d02ff76

    SHA256

    4cc90a9fff61cef75a67d497f537bd50c1e8845b043a4d057be4ff97e8a061cf

    SHA512

    c0d03465a81035333135d87bf8ca072448b668ffa90d13328798283f7d98c6d14a43628f5de2f3f7f0d486bbbb370894d8a9eaa108e8218e2d3ea82b94db0a30

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    69KB

    MD5

    69557275e8f0e05553aeed4cd9266dfd

    SHA1

    488ec0e8845d11b1ae5ca73828c45671d738ea2c

    SHA256

    d55ce4216e7940e1a72c4be32a63c03081b9555b8d7f7f085f48bf84fc71fedc

    SHA512

    4d96f891103acbbee80dee70865097c1b8d22740520e66c18f1a29f198f363b8e25ed6ceff630d1e70665456dcedf608eceb8d1c27fc80db268fea4ccfb36038

  • memory/2096-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2096-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB