Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 01:23

General

  • Target

    9f982fdaee6645cb381810ead0a43b06b670606792e6d6f4f834acd02c1452b3.exe

  • Size

    47KB

  • MD5

    d7c68aba6143f30fea85967f8119c685

  • SHA1

    6a8c9d15d0b6f2ecc9246bcf4b8eeb24e12618e6

  • SHA256

    9f982fdaee6645cb381810ead0a43b06b670606792e6d6f4f834acd02c1452b3

  • SHA512

    6c6ff2d14e97523906044fa87eb248582fc126188a8c53e7b750698fa42d5884076d1ec39d32ca4d2a0b5c0f5ea233957f4fb78537024dc64df1811b3e1eed00

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhJZaf67xdKhUX8MBE:V7Zf/FAxTWoJJZE+ZO

Malware Config

Signatures

  • Renames multiple (3461) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f982fdaee6645cb381810ead0a43b06b670606792e6d6f4f834acd02c1452b3.exe
    "C:\Users\Admin\AppData\Local\Temp\9f982fdaee6645cb381810ead0a43b06b670606792e6d6f4f834acd02c1452b3.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3020

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

          Filesize

          47KB

          MD5

          3c53a419595ffaaafc9437fd6f5367cd

          SHA1

          85910ccce59634d637554a5542de40bd87c99d21

          SHA256

          176cb4db0be5eb4c0bccb7f25c48a32cc19bcdf8efa391147d3189cc0d9fe933

          SHA512

          ff4725b0b658916643eb92503575ecb116621aa2500ee14641bd4a45ef07574cb14eb77e64984481936bb7bf50644fd084b12de1c2e27fb3b9a3e831a0c184a4

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          56KB

          MD5

          59e2ce77f00bea8c4aae27875f4ae331

          SHA1

          38d87623790da4c2d0eeb7c12cbfc22b13914c09

          SHA256

          c3d68d7bc75629c006dc6e1e376dcbfdfe34916a48d015930aad1a2a171476c0

          SHA512

          2603338430c541501ab86b6faffc83fc25db75791f987327c785a7d6a8680bedd79b4fb0bbe7186a3985a2cb0ec2ce77f2ce3bfa315f24b259d965f78ac8607b

        • memory/3020-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/3020-178-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB