Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 08:15

General

  • Target

    0bacc2578103ce05f697eba4ba9d168924ac80172cf0bd2ff36d91f834f36fc1N.exe

  • Size

    101KB

  • MD5

    74a835c12cfe49dff9b0c227a07636b0

  • SHA1

    7d4389b48dde48f039ee715c2f1c69690d4208c2

  • SHA256

    0bacc2578103ce05f697eba4ba9d168924ac80172cf0bd2ff36d91f834f36fc1

  • SHA512

    68e1d709109ee646e9ef8db0c85fd7817d4dd0634fa72df74bb781d43fd420366950e2ba4541fcf00f0518849921707bde56271b719e81aeff9fdd44ff8f6de8

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTBHfiPRdgTW7JJZENTBHfiPRd2:fny1tEwtEt

Malware Config

Signatures

  • Renames multiple (2852) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0bacc2578103ce05f697eba4ba9d168924ac80172cf0bd2ff36d91f834f36fc1N.exe
    "C:\Users\Admin\AppData\Local\Temp\0bacc2578103ce05f697eba4ba9d168924ac80172cf0bd2ff36d91f834f36fc1N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

    Filesize

    102KB

    MD5

    be836e407fb22e8eae894a2f633590e1

    SHA1

    3c0dd5853c5a1d79a78e49912856f6dfaddac1b2

    SHA256

    87fd10296faf57c0cd089918c20d6519e9526301780ad89d5d4bf7887120d9e9

    SHA512

    5f1a1403615d64fdb74e1bb59dca8680c84e93c9bf2f4b36ada2c55c9d5164c05942516ac134142eff8523beeb5b7c6831cbe9a6a4ad6daee28617dc2205d812

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    110KB

    MD5

    1b8025e0fc4dc2bfee63894ff12aa9c8

    SHA1

    32c6fbaa15d4df723bc4005c20df589ca3fccf8c

    SHA256

    ee183f812a85960abb44c7832000bcbb98f0219f67cb582ffccf2f8915f15c64

    SHA512

    dcb94e2176a6e50665103576e3ddc5bc10ba1f87a798eaac3ba5c4894ab3cfac635f0083af9b94168332117de93b4ccc16fc64107634764979b3226cdc1df4ad

  • memory/880-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/880-68-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB