Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01-09-2024 20:35

General

  • Target

    9855a3dfb0bc4e12bc83c76aa0b482f0N.exe

  • Size

    54KB

  • MD5

    9855a3dfb0bc4e12bc83c76aa0b482f0

  • SHA1

    7e6f9959698742b173b31af45dfda6e0c5b39103

  • SHA256

    705af9025eef175c5b6eac58ba8e66cf1b91250f083cad8fc52761259b38eab4

  • SHA512

    e051eefb4e02ec91e50124f7788e905f8302e6e7582fd60d64a151fe7b9e57e48dd0c55b54282b6d03d7521580886fed7b5d3a43683f52a86df8ed4bf4a02542

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9DJKGJKTn/bYONYOR:V7Zf/FAxTWoJJ7ThJKGJKz

Malware Config

Signatures

  • Renames multiple (2822) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9855a3dfb0bc4e12bc83c76aa0b482f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\9855a3dfb0bc4e12bc83c76aa0b482f0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    54KB

    MD5

    4bd722dd2a43058ddead282a91e5f880

    SHA1

    ce0e6d3836535e5e700237c50e8a7079c27689f3

    SHA256

    869f8936fba13309239b49ab8c64a08af01b5b8ea89a5963f69117054c8e1ce8

    SHA512

    b32f65a370fd295c6996c4546be9c635ef4ecd38fac39eef719e25153b1f08dd15a2f7438246d2ee8ee402b6cd004cf7dbc695ed57af3f4d4463a5119671a371

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    63KB

    MD5

    c18394f98475e714ae758a23fed839c5

    SHA1

    0eca823121921d4fae56f3e3108cdf6bc0bc74c6

    SHA256

    7c3a7b1ba77aaa1e3f0aae589bc36fadcef2c69fce5f2599be2386ab31ea4734

    SHA512

    257a0e964d64d5da8bd539084c505329ea79781a4237d714b84db070edf919161ee21a3deea08d697c31733efdf4a0cfcce6afd517a5a48a3b2faa76adbb9bfb

  • memory/2672-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2672-62-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB