Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    27/07/2024, 05:52

General

  • Target

    9c590688de8ea598f6d1e7cc7699c9c0N.exe

  • Size

    21KB

  • MD5

    9c590688de8ea598f6d1e7cc7699c9c0

  • SHA1

    3d645312106d75ea7b6250d8a0870833fedbd1ae

  • SHA256

    c00a5711e33b13fbaf868a8a7d3ffef936b2f44c831814206ec473df40990b79

  • SHA512

    d552c9b4cec56af68381c5f761b6e4d1e42fb1fe3820df786b1668b3c9ca5ba29b337bca92d221b46963332693e7a60a088d766e6096bbfd970817f4601ff8a2

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJcv9c34UD+34UDnVuQVO/IO/L:kBT37CPKKdJJcu34N34mVuRhL

Malware Config

Signatures

  • Renames multiple (1189) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9c590688de8ea598f6d1e7cc7699c9c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\9c590688de8ea598f6d1e7cc7699c9c0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    21KB

    MD5

    98011a1f0a70e4bc95b19ddb35b9cd01

    SHA1

    3af3b824337d97b140a7e4f90decedf89a36fca9

    SHA256

    7944abde61b4fbab26fc0804d60714a56e63378a508723c47bf65891ff18fc19

    SHA512

    cbb149011ef8436fe42e8c03d1c651816ed009f8815d12f8572704395e503ee99fb755d414aa4f4232b1dff17986fe7b4e3c1734c104ce7a2af375f6b88e102f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    30KB

    MD5

    3d9f7b264c6fd7092038c9f39e10d1f8

    SHA1

    aefa19006d4334517f88a69a1b60a0dc3746bc6f

    SHA256

    bd14310a9b6444d261360c8dd2887e7ed415ab431cf9e9bfa38e762c0bb0dcc6

    SHA512

    3a4c2137c8552310c6171b9fec76733e291370fc8ebcf4cd538286d7250c82d86c9be201227e6073b1bcdcad5aaef8cc709a778431887029730b822e8b16aac2

  • memory/2892-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2892-48-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB