Analysis

  • max time kernel
    119s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-10-2024 15:05

General

  • Target

    eb0c4fe937a6dc7b32bc3dcd03cdf2aa983eda179469bb141ca9dc10fb0258dfN.exe

  • Size

    55KB

  • MD5

    c43beb69e70d83cd8eff98cbfbc530d0

  • SHA1

    c57a9999135189e01ff35b2864d8a4a893f4f257

  • SHA256

    eb0c4fe937a6dc7b32bc3dcd03cdf2aa983eda179469bb141ca9dc10fb0258df

  • SHA512

    0eee1b8d8416c563b3053b60848ab055c3c2ab31a1a1ad4b33bccbd1234a40b58be467906f156e1a61eb71662bb52f5bdaafe4ad233c582534ccbfbed95179f6

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9PoNon:V7Zf/FAxTWoJJ7TP

Malware Config

Signatures

  • Renames multiple (3248) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb0c4fe937a6dc7b32bc3dcd03cdf2aa983eda179469bb141ca9dc10fb0258dfN.exe
    "C:\Users\Admin\AppData\Local\Temp\eb0c4fe937a6dc7b32bc3dcd03cdf2aa983eda179469bb141ca9dc10fb0258dfN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2332

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini.tmp

    Filesize

    55KB

    MD5

    4bcf8d1d8e81a2afe1b4bc7053f7bdcd

    SHA1

    1807a40a523ba426b6f7b09fe51de83d36d9eebd

    SHA256

    f4cfef5d0d5974ebb546182aa877c955d2f18e1dee0997bf1a2c3d5cb503931e

    SHA512

    0c2ce314face8e99503944a2fa62057411e1f34d01969faf2bd8d62d356b2bf5a0083fccf64806b50fe93d413d45415ed43dffc0b3bd691c61cfb395dbcf7b71

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    64KB

    MD5

    c776f587e497c92fef4fb7ef9a8ec602

    SHA1

    45f38bf6ca70ea98d5f4f2ca92784b395673aa61

    SHA256

    f40b4ac46cf3877adfd9e480e41a929cfbe231e0b59fd8d8c57fc15dee48e489

    SHA512

    bbb98e57793c3791b22b73ad08c50b47f1445e78e4b7a03a00c6eded298dd2081aedcbf61d04f1a2144dc51d821a3650d7c7508618811d8685ab2b5c6a1c12bf

  • memory/2332-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2332-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB