Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 03:12

General

  • Target

    8c1fe1973a0c6804ece99fcd2920f090N.exe

  • Size

    34KB

  • MD5

    8c1fe1973a0c6804ece99fcd2920f090

  • SHA1

    968989803b785c9bef73934e89a39c7f2491c853

  • SHA256

    32a6a0d561d6ff707ab403a6ef075d96a8521170e4175f7a624fbe212b93430f

  • SHA512

    24984d35d39f6363f3881f8020570bed8daf802417d89be2486d6b84fbff8b709ec509f95addf1dc1bf211fcc7bc67b66852c2a5cea18d54932504c248e88d21

  • SSDEEP

    768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATBaMY10/:CTW7JJZENTBTYk

Malware Config

Signatures

  • Renames multiple (3228) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8c1fe1973a0c6804ece99fcd2920f090N.exe
    "C:\Users\Admin\AppData\Local\Temp\8c1fe1973a0c6804ece99fcd2920f090N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2257386474-3982792636-3902186748-1000\desktop.ini.tmp

    Filesize

    34KB

    MD5

    2d86086bc41529336b05a66d2fb9f4a3

    SHA1

    7a47d68df73f82f10766bad944f5ef7c96d3d7cc

    SHA256

    b203bbff9b42be001f87d3e5e69af6ca75087e63e161c6e35bdc90ae1102aeec

    SHA512

    1688f4ce3e64dee24dfc5c0c6f6ff54ddd14b78190880bf301c5d80c45be818e0fc60a19fd77431a05229e68d8ca3bd3d9ff3f9046eecd83e00ee009d8ae525a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    43KB

    MD5

    f8f1681d78f08d96467b6e573c979314

    SHA1

    39125c13c71b3d01f65380c5d3e89146365ad8fe

    SHA256

    fd0db1dd74826b1f1eab8cc6ae1a9b2d811408b587a4d0d9a5746fea33473d1e

    SHA512

    f9bb895711108cb67a0cdfbff6f49996f256991df0de1ae641fbdeea9e9cc5628ec7cbf5527f5de2616fbc907aa5b4992e287a875f487a802b3b95a95b87258c

  • memory/400-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/400-69-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB