Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18/10/2024, 06:50

General

  • Target

    315d4009889fd0e5ebb4ff6d2aff4666a07c26590cadcb7c924b97e200834b0eN.exe

  • Size

    82KB

  • MD5

    9baa7a98d217516975fbf328e88ad890

  • SHA1

    c54a7ae65f817f649581b30a617e5fdaf6c8fba2

  • SHA256

    315d4009889fd0e5ebb4ff6d2aff4666a07c26590cadcb7c924b97e200834b0e

  • SHA512

    d4611e87e8aed384c23b63f82e6bb9bdb9cf0954e0d1a861d6d45910f77353c620a90666acbc7880f1b29cd5096d565af6e40edea984254808e878e21ec465e6

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9jBT37CPKKdJJ1EXBwzEu:V7Zf/FAxTWoJJ7TjTW7JJ7TGHs

Malware Config

Signatures

  • Renames multiple (3532) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\315d4009889fd0e5ebb4ff6d2aff4666a07c26590cadcb7c924b97e200834b0eN.exe
    "C:\Users\Admin\AppData\Local\Temp\315d4009889fd0e5ebb4ff6d2aff4666a07c26590cadcb7c924b97e200834b0eN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1260

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3533259084-2542256011-65585152-1000\desktop.ini.tmp

    Filesize

    82KB

    MD5

    2409534358fa2d919df3195113c2b81a

    SHA1

    065524a8c2eddf6c504aac842a290f7702429cf2

    SHA256

    61bc72457ad0ebf1538cdbffbc7e9b2b002aa66744c497b28a8b5558624a797a

    SHA512

    4af2930f3a36172915c52faf2a2e58405b0ada74cf23f594c4f9a6dd212900446a17c451ac6bccbd47c9a098f83c763612db848dedb9127905dd44dc9a05c310

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    91KB

    MD5

    6e40b1f552b8696615af7c804e385981

    SHA1

    d78b698a653ff235fedb09830cbfb8bea4b2cbb7

    SHA256

    853bd111ff66402e2b6c729af1d03ffe00a53bc109214552ff8708829b666f65

    SHA512

    f0d4b63365f629cfc1fbefa9685ad53318a9f59315b2896ce8f865370f19153705e5ca6047c776d6b46365732de5533151a2875c3335b408689043e185eb8f62

  • memory/1260-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1260-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB