Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02-09-2024 13:00

General

  • Target

    9f583e048107b37cc9839a3ac3f7e680N.exe

  • Size

    33KB

  • MD5

    9f583e048107b37cc9839a3ac3f7e680

  • SHA1

    780d82bb1cc9dfd7c5a4dab5412635443a9d1ce0

  • SHA256

    f4342be5accba9a321339af0c93235a1d9ff6dd57bfcdd7150dbb8f126bfde86

  • SHA512

    ed7eb08d1f5f4def0f36f1b1581f9bf51c697b2b619f864b40bb232fd05268178126bb0d7a4174a429bc99fe8b279675768763d0605f28253d239980987c8a62

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9VYHIs10YHIs1E:CTW7JJ7TDYHB10YHB1E

Malware Config

Signatures

  • Renames multiple (3361) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f583e048107b37cc9839a3ac3f7e680N.exe
    "C:\Users\Admin\AppData\Local\Temp\9f583e048107b37cc9839a3ac3f7e680N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2620

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini.tmp

    Filesize

    33KB

    MD5

    5d18f2544d7235f19d8e6a855c2ad8e6

    SHA1

    bf22be5318d6f8a23ab4defccc1386e785d940a9

    SHA256

    03d523ba2eada48e2e530b9fcc39039138b54de0eaaf06442d5321c79e1a4a64

    SHA512

    f3074f5adb9e759e589b885de8096471f0524f5ee73ee71650f98894b2b35c1369cd4f3b4cdaabe0f7b02d153c88452c67e974c71620d0d055ab209d0ee68ba0

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    42KB

    MD5

    b97eb3210499f0c0c13ca075caa02dca

    SHA1

    71f1b20a58fdd3fe6545da57d9745c3ef79e7860

    SHA256

    02935415c52958987e3ecbc659f744ae272a1abe91f20333f6f0d594acf78d3d

    SHA512

    9a89c49dcd506fca3232f2961cacdd24d6e3fe77daa25002b329353b6de7b6c5ed4b1a6c282fa66039090a78c63f99d26945d77415dfe42cf0ec59e708ca2670

  • memory/2620-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2620-70-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB