Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 18:12

General

  • Target

    6527ef3d974c65ef183845b78f99154d7a49763d38063a39fe563ebb4502f898N.exe

  • Size

    36KB

  • MD5

    2f6da7ac9208fd87cc26f223173fc900

  • SHA1

    377b3d4e7c0482b9b2c73ecf699499303316a1e6

  • SHA256

    6527ef3d974c65ef183845b78f99154d7a49763d38063a39fe563ebb4502f898

  • SHA512

    91be5d3996dcef8e173d211fc51c7db579b07367eb9f1a0478813a50a0e42191874fb518bcd645d88b1e07eb25ad571ebc3f274a755b4f9b52fe8b3012aeb119

  • SSDEEP

    768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATBHfBo8o3PV15R5s:CTW7JJZENTBHfiP3zm

Malware Config

Signatures

  • Renames multiple (2951) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6527ef3d974c65ef183845b78f99154d7a49763d38063a39fe563ebb4502f898N.exe
    "C:\Users\Admin\AppData\Local\Temp\6527ef3d974c65ef183845b78f99154d7a49763d38063a39fe563ebb4502f898N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    37KB

    MD5

    d4488e325c9294e71a83a89b17e43d42

    SHA1

    62615eda7b172228fc9c5e51e90301f944cb73c4

    SHA256

    b05e100df423ec98e347215679d4d39d4ffc0c6555b9eb836f8be54f020b3d8d

    SHA512

    87d44b3312ebaf6694bdfb08f01316ed79809f3986a715c2d085df3e7fc93e57b80fe9a3324482e07e66080df5ddfea9d25273d804311e5c998e00379fa79353

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    46KB

    MD5

    3f5eb4ce5bdd06cbfa5c642ac1520efc

    SHA1

    1199f86a94ada361b86a4273dc5e5dc04c81dee3

    SHA256

    eb56b9c7ad27665893b6b369b600dadef510dca1391a903dbba33cc59508c0a2

    SHA512

    b2517bbaf97d421f537aa629b75661a208123a1a38929d84ffbd1dd2938edad228c5760be9786f6e49e2d16284631dc1123c9965aac56a498acf04422d68622b

  • memory/2368-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2368-65-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB