Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 00:09

General

  • Target

    9330069bbc7a0a48729e20152b40cad189666df658f605fa6cea8f4388bf79e9.exe

  • Size

    31KB

  • MD5

    d460da016e38a65e332fd96e0ab0c68e

  • SHA1

    7f002e5104c19d45b03b964e6718270891eb0fff

  • SHA256

    9330069bbc7a0a48729e20152b40cad189666df658f605fa6cea8f4388bf79e9

  • SHA512

    31d244c3d080aa78f9f7646884f7fa47f332c41950239eda3b54e4164e822e4ae44c7e9916d23c655b6995bc2679396b7bbe48954589f5534d9932ece228393e

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJ1Evd5BvhzaM9mSIEvd5BvhzaM9mSsxmMxm9+9gOSp9z:kBT37CPKKdJJ1EXBwzEXBwdcMcI9IEG

Malware Config

Signatures

  • Renames multiple (3758) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9330069bbc7a0a48729e20152b40cad189666df658f605fa6cea8f4388bf79e9.exe
    "C:\Users\Admin\AppData\Local\Temp\9330069bbc7a0a48729e20152b40cad189666df658f605fa6cea8f4388bf79e9.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

    Filesize

    31KB

    MD5

    3e5f3d9b21df4f387413fcf90da2f478

    SHA1

    84f90ba81e445875ea541307f091fafc5c58a2cd

    SHA256

    cfc6a6b874468c89836210c4eda956e407d5f2c6419d365f2070a845ee1bf509

    SHA512

    06f8cbb90573c98b37d27bedc0e3e077334dcfa45c7c704301386ae79e680d05266a6962467e107b99db5e6bda37e3add60597503b8810e4ea112b83795c10a6

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    40KB

    MD5

    6a0277eb59716b1c45da5bc65629f744

    SHA1

    654a353e61431bc0c706dd2bb506216f7ebe4b34

    SHA256

    cb55e7238c0ccfd79c75db68d954792e6f29023ca7f1275879812819bfa3fd6f

    SHA512

    659509b08e88036d649340e760ba6768f27b86b9cf7452c380ddd3b3ab530c5950d6568a6e1d27fd63387135834407b3591599e1e92fbab70d99fd669f83265b

  • memory/2156-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2156-73-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB