Analysis

  • max time kernel
    119s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15-10-2024 00:59

General

  • Target

    64056715feec20245d8c4da077a277a3424f1249489af2b6fe8de039de8a0ea4N.exe

  • Size

    79KB

  • MD5

    67fab0b8e95c103f478abb8ce5109120

  • SHA1

    94042fe759dfb908c180b9f38af9cd4fc5d09526

  • SHA256

    64056715feec20245d8c4da077a277a3424f1249489af2b6fe8de039de8a0ea4

  • SHA512

    4385e5869e5e1e7b44929d2ad31aaec255f840ae742e4cc544e2315846ef46466b6602e0bb1af06ccbeb3ae8891bca6ab8b2a1af5d23e50893f85078a8c6faac

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcwBcCBcw/tio/ti3c7Fc7I:V7Zf/FAxTWoJJ7TTQoQmoI

Malware Config

Signatures

  • Renames multiple (3147) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\64056715feec20245d8c4da077a277a3424f1249489af2b6fe8de039de8a0ea4N.exe
    "C:\Users\Admin\AppData\Local\Temp\64056715feec20245d8c4da077a277a3424f1249489af2b6fe8de039de8a0ea4N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2980

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

    Filesize

    79KB

    MD5

    56f95251490a180e323216dda804de92

    SHA1

    67721681fa97f5be1e01763b3901825b20cee3b5

    SHA256

    3cfd878cc170ceb2514a5ad94f0f032a896c05d5b9d11e6bf244852e1fcd2b95

    SHA512

    13ceea552aae34c53c57453060d853baba44621957c01672febc51af55a3debcd8d6a19929ea84f178bc9b62934a40f62492386f296f56e37df6776f670ed8af

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    88KB

    MD5

    a76265c33e8e47bbcc0bf47aa71b7e38

    SHA1

    6c78df4baf84c5a5bee15fc6c99897ac584042d6

    SHA256

    fc9c99a572978ea8f246f8db5f363dbbc127545ab1f31903df7e2aff448b3568

    SHA512

    4e96c42bcfe3c8db461b85de68319b521e46eb2068261f83f6f9e52d544d8625fcc2a59f5b180146cb5eccc597a22a9b9fd512618f3860439106cc8f31db297a

  • memory/2980-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2980-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB