Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    29-08-2024 14:08

General

  • Target

    9c136cc7231055867f89b2f18b1dad90N.exe

  • Size

    138KB

  • MD5

    9c136cc7231055867f89b2f18b1dad90

  • SHA1

    8597683c160c928ef631d0a64c917f68d5378165

  • SHA256

    de78d650253b26a2fa60c62fdabdf43adde9791fccef5e00932ca87f79639c33

  • SHA512

    e5424c457e041bdca97ffff5908ed0d3cfd529b4dab5b1b954260a8917b5beefc3010f53b674ee8bc998de6c2694511c6b60bac0b000247179ab6abcc5e71ae2

  • SSDEEP

    1536:V7Zf/FAxTW/ySSh9j+9jpGnnWsgjsTn7fpXpgmvzOdSrnvOdvxoR:fny+ySSh9j+9jUnfQsTLpXYSrnvOZx2

Malware Config

Signatures

  • Renames multiple (2811) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9c136cc7231055867f89b2f18b1dad90N.exe
    "C:\Users\Admin\AppData\Local\Temp\9c136cc7231055867f89b2f18b1dad90N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2128

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

    Filesize

    138KB

    MD5

    54ee5cbde45ad435ab44a5227697dd16

    SHA1

    d1a8be503a468a9787fd32cf8b2f89d26df380d8

    SHA256

    f91d15cf0e8f5e6fbdd7a6f1d8361745f80cf12b0d6aeb702e49b284910b9cbd

    SHA512

    ae18a1d4ede42633193424efc7989858ce60efc8e18862f1cb7fef1edd5d689e50d08781b3146c8f35a4569c6599470836b2a19fbf4738cca8e9df0a4005b336

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    147KB

    MD5

    9033bc7de1433c4e3c2609eb640d64e5

    SHA1

    a7566a61de1d74ed2e27c6c8e00d30b79026c0d2

    SHA256

    4d1415829dcd59c4391eeded8ac70dd977475e78129a2318ec05d1e64403bd41

    SHA512

    115a5027b02a299ae42e904a7b57f5cbca5fc790fbc673c21170b0a18209531d50631ba44f697c1d74a63da83d09016f18eafeda25120734cbbc31ae1e0937a5

  • memory/2128-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2128-68-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB