Analysis

  • max time kernel
    12s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    12-11-2024 12:27

General

  • Target

    70384e668b5fafee07108f165d1e98eda4d3a4822dfc8be46f6e255e6a8a798fN.exe

  • Size

    238KB

  • MD5

    0b69cf6e60fb68d4eec9978f5472b541

  • SHA1

    d254dd425b4807ed2daec3782033f1ba0fd15370

  • SHA256

    f0f7f1041caa54f45792c18f9c7e80031e5e31abb3d046f5ab7222e3263b16d8

  • SHA512

    8b21ad7bf9fb10009a6b895eb2004bcb411b93c88c3922e6b57e2118b8596e22cc5c768f2f4d998dcb3a02ed6307887e07e84f8b4acb5dfee74f18418907ca37

  • SSDEEP

    3072:PDVef/hIVofyhSOUuC4v/oVx8Gugbdm9AYvZz5THnbez3PoL9Uw:PDc/hIifyPGugbdzYow9h

Malware Config

Signatures

  • Renames multiple (255) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\70384e668b5fafee07108f165d1e98eda4d3a4822dfc8be46f6e255e6a8a798fN.exe
    "C:\Users\Admin\AppData\Local\Temp\70384e668b5fafee07108f165d1e98eda4d3a4822dfc8be46f6e255e6a8a798fN.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\7z.exe

    Filesize

    544KB

    MD5

    c0a74023b633fd962053fc9592d18b45

    SHA1

    60a77887f676650119d71cdb4e9cda7234235c8b

    SHA256

    fa14ce0cead3ee68bfe224eb9a2a1ef85261265e31cbb9e4d509800c83338602

    SHA512

    001f577f927ffe51c6152a68e2242245bb299a3cc2d76456b6aa6563e4321b18d728ee5c41dc90ca797c7b8aba16b00a0a2713a20bdace8b1b99d0fd9c4837bb

  • memory/2372-14228-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB