Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    08/08/2024, 03:20

General

  • Target

    c9a613c5b9b7cfad922bf68ce120ef505245c06f288627c9efc5c43a13124a62.exe

  • Size

    47KB

  • MD5

    b53bc68485125f77d36a7591b2dfed5a

  • SHA1

    b38dbf300f241a3ab661a9c13492de27e49a373e

  • SHA256

    c9a613c5b9b7cfad922bf68ce120ef505245c06f288627c9efc5c43a13124a62

  • SHA512

    749d237a517ec11990d5fa208de6da6e4c73aaf32467eeaa6e383d19a78f4239e762ec8763d45aa6475704444a172e2188b2bdcf187d7b526e178b699989b300

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATBxCWi0DZqWOCW5:V7Zf/FAxTWoJJZENTBEIlIz

Malware Config

Signatures

  • Renames multiple (4106) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c9a613c5b9b7cfad922bf68ce120ef505245c06f288627c9efc5c43a13124a62.exe
    "C:\Users\Admin\AppData\Local\Temp\c9a613c5b9b7cfad922bf68ce120ef505245c06f288627c9efc5c43a13124a62.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

    Filesize

    47KB

    MD5

    52a4dae84ecbf1d7261fd37c63f4ec03

    SHA1

    531f203fc7381ad79a5ece5adb76fa7d48fcbe8b

    SHA256

    5c7c9e672547247af5676ebffc81c4ba16150e73154bc652f60f2a8de6437ec4

    SHA512

    cd5cebc44309a19e6f7a4daa78e1264d6348c9a376e684e78c5ffe6873905f06cca97206a0793a7d8ec8f342f26c14474bf96f06f2ecffbd3258ddae8f402603

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    56KB

    MD5

    ea01106a4c25589b97d64463565e6a84

    SHA1

    fb1b98e58ed82c11dae45d2f2dc35db1916cdecc

    SHA256

    ca41cf49917d870d8eb82f7f9f6f18a5686e2c4a28a42382b92d27135446e499

    SHA512

    422c8e20ebdf0000fdfe89343be1da802ff412d2f343f94bfd4a67f4b3cbbe42784954b879fc9ba0d17556b0112dbfaf6bb95fa0fe86f289ad85562f4748b0d0

  • memory/2624-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2624-668-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB