Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03/09/2024, 08:08

General

  • Target

    7c45f9dbd5ac1debe713a653b87a3160N.exe

  • Size

    82KB

  • MD5

    7c45f9dbd5ac1debe713a653b87a3160

  • SHA1

    aa00706e2fcfec2e209ea9184cb5b8a9bb5fceb9

  • SHA256

    87adfc96fc7da56036109a8bb59b72dbb89cd052092130246857ed30d30d9cb3

  • SHA512

    bb0e93595b08a2d3dfb677fcc4f3551e3eeec21b5f7118472ba2b8ef6b129e25635d33c1d591fd5063bf54a72b51fc1151b99f921aff51b1ed0912658234f205

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8IZT+bsbP:fnyiQSo7Z1

Malware Config

Signatures

  • Renames multiple (3106) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c45f9dbd5ac1debe713a653b87a3160N.exe
    "C:\Users\Admin\AppData\Local\Temp\7c45f9dbd5ac1debe713a653b87a3160N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:296

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1846800975-3917212583-2893086201-1000\desktop.ini.tmp

          Filesize

          82KB

          MD5

          029fe94ce5a040be9a47f3fee30a30d9

          SHA1

          9134e7bb2010dfc867eb1337f89f0f172cf8aad8

          SHA256

          eb9b189c25d378ef88cd34c10ba234f0a69235c76c47d3e89b8ef680ccffa7c1

          SHA512

          adc9b5c5b67972cd2d3ac0de1a89f8de2008068831dd920fbcaf2cf4236d613f18b72af02679d88e84912c0898475028613470c2e17534667fd5d19b01d88c02

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          91KB

          MD5

          2aa54f95a804d200412081aade28b2bd

          SHA1

          624c5e8ec1c65838aae22d20d4bbdc9ceb3b1f18

          SHA256

          0bb5a2d1cd13c5b55dba873f9429194067c1c0ef8bcd1369d2939a2f3f3e8fed

          SHA512

          2cead851c8ffdca1d0c2d8cd0a720f738a334e8c000f8484d4f4f57ac7ea14a08b3b1a3164b2d2b9d0f14af51413e95db4e32cbe3b6129a2a6e8237e86a4c498

        • memory/296-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/296-68-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB