Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    12-11-2024 11:56

General

  • Target

    6b75d2b28f07b263295e7980031d84adf2a4a227de62307785c998cd44c5d686N.exe

  • Size

    65KB

  • MD5

    084b59c26f5df2be4cd00b2c7ca57432

  • SHA1

    a184fa8f0747d2c4eb9aa93d3ff20bb4f2fdcaac

  • SHA256

    7835bfa9fe4ccf19b768a291997a6b9413351a7890ed80f2a3fb631719c45a75

  • SHA512

    454d56caa9a6388ff4e64e6084089750ef6a9aff63a6a7641b5039d3d1278a6a3b28082c27f6a2338058b0310713df90df305bfd85deb29da92b377f0186c97c

  • SSDEEP

    1536:V7Zf/FAxTWoJJ7T3cFMOu/h6HSKX/8KX/FdyGdyu:fny1bcHB

Malware Config

Signatures

  • Renames multiple (2721) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6b75d2b28f07b263295e7980031d84adf2a4a227de62307785c998cd44c5d686N.exe
    "C:\Users\Admin\AppData\Local\Temp\6b75d2b28f07b263295e7980031d84adf2a4a227de62307785c998cd44c5d686N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2396

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1163522206-1469769407-485553996-1000\desktop.ini.tmp

    Filesize

    65KB

    MD5

    0a1bacf33ab3972c104355d2dec4eb94

    SHA1

    8ceb8155bcf5e93db5ff210f85a7d0111ec85af2

    SHA256

    42a63c21505319544afd05a89589e3605896032759a0bb30ce7f7723ea6467c9

    SHA512

    0050021e57226347330b648b931ae83144c4b1618d623cb51044c40b5f287e8ecf9f3d806650998379ede313673dcd0b5f8a464bca2a5c411aa878da16a03b8d

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    74KB

    MD5

    7e0aa6f47536cd253d080598c5a00418

    SHA1

    c955a5cb94cf161b65248f672ce1a9b1adc296d4

    SHA256

    cee99b6d44a1395b58d2a032a4584eb25b89bab264ecdc85287f6da8cd547e93

    SHA512

    9dc8454a9d4596e33db708f1806404cd15e6592068767ae1c471773d4285c87a6af037f45c136d3ba1212b10e099bb602b399eeee81895c36fb4c2e955554f48

  • memory/2396-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2396-62-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB