Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 15:48

General

  • Target

    2b0b4dcc0179679bbf8323d2725f0fa69afebc7e4281f9339adbe7c6b11b633bN.exe

  • Size

    36KB

  • MD5

    4abdc8ef38dbfb6ea6ab9813668d3620

  • SHA1

    a7c231fd29a925bbc0a90dc45d05ab4fddd7bba0

  • SHA256

    2b0b4dcc0179679bbf8323d2725f0fa69afebc7e4281f9339adbe7c6b11b633b

  • SHA512

    2579639bdd621be18ed2806403f229de40663021843e524651deb008856d9b7b618a1327565f83fb29fd7fe1a19ae2bc6d073454967f3aed3fa1d61a27329bc3

  • SSDEEP

    768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATBHfBo8o3PV15R58:CTW7JJZENTBHfiP3zu

Malware Config

Signatures

  • Renames multiple (2868) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b0b4dcc0179679bbf8323d2725f0fa69afebc7e4281f9339adbe7c6b11b633bN.exe
    "C:\Users\Admin\AppData\Local\Temp\2b0b4dcc0179679bbf8323d2725f0fa69afebc7e4281f9339adbe7c6b11b633bN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    36KB

    MD5

    3a6d0b9baa4ed589a364c8453ff37f31

    SHA1

    e425d44e6e576c92820e6a56c03ccf8620965d2b

    SHA256

    4715e9dc2d36d4c285fc657a4a44b31508dba1647f608aa3a23e98c7fa027da3

    SHA512

    dca5f508fac87a1787a5b3195f8de82c8c5e2154c0902d416297f3b3b7b709e57ee7a7ee09788e2c990c20aeefe38a3976a4909f19579f7c4c67a2c42903f2b4

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    45KB

    MD5

    2c27e884e55d6984432cfab5cca9124c

    SHA1

    c6f950da4ffd4f736529cf5e75fa21af33337e39

    SHA256

    25ee27d94b416e42781128bb464cd28757bfb74e8cb8e3f850334180376db4d1

    SHA512

    c6b0cb2c1f4c73e4b8c8dcd249176a65659ff22af01fa389ebe900fe4e208d6484220679ede8928433716f6c6150698bea140bf0cab8ebd0f072ea91a644439e

  • memory/2904-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2904-52-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB