Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04-09-2024 21:06

General

  • Target

    8d0143b5fcfb260b6a970037150a6f90N.exe

  • Size

    42KB

  • MD5

    8d0143b5fcfb260b6a970037150a6f90

  • SHA1

    7c0d9c1107f175e1680d26f02185473e16f469ed

  • SHA256

    57bcdf80a20fb3a5bf814019f5f13faefd21e5e7481c204ae6f3b16e8a0f4132

  • SHA512

    c1158f6539dec0861205721e6a50b285b9799fb317155b2e6194675b5e4b426a9180b3f613ecfc65db0a2ba0f0da66e8ad279809da271c6d56beed544d0d6cb0

  • SSDEEP

    768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATNyHF/MF/6m0m+s2BGUG3oxoYM2M11Y:CTW7JJZENTNyl2Sm0mKX

Malware Config

Signatures

  • Renames multiple (3246) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d0143b5fcfb260b6a970037150a6f90N.exe
    "C:\Users\Admin\AppData\Local\Temp\8d0143b5fcfb260b6a970037150a6f90N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini.tmp

    Filesize

    43KB

    MD5

    a50ce3c079b251a78e75e5b80545bd71

    SHA1

    17c7bc068b4ce956a9ddce8271f13718a5ae6e8c

    SHA256

    ac257a0c1a7ad0898b08b29765ac741d43867867eaf4aa8a6837db876b9002f1

    SHA512

    4f9e2cadf6159ce2fd163953c78a50abdc0e87225a853516cbb9662fc10ddc96415f30dbb76998a0be1d941e138f542fab976ec9a08fa9d136633cf30dc4300a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    51KB

    MD5

    1dc7e501a1e458f42d6d035f4b10efc1

    SHA1

    717db8b378e125dc3e858d8d6fcb924621ed3943

    SHA256

    0901b4f4390f707e13306b7efb0f6a9d2a6e82f7c033ad20a9d87852c2be32c5

    SHA512

    4f05ca3131b519faa37b2f3e8c06d1a834800aeb517ac287cbd639fb882df6e24d6260c8c99648921ca1e8ee11f520a4e1ccafa4ac9cf48dd31de5e5807b0360

  • memory/1796-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1796-71-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB