Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-09-2024 12:21

General

  • Target

    8a119c01ebd4114c7207330b20759ec0N.exe

  • Size

    150KB

  • MD5

    8a119c01ebd4114c7207330b20759ec0

  • SHA1

    fef71ff55cdf6f66082a785861126afc018965e2

  • SHA256

    d1760d2e7c3577ce6867edc6ad5782927352d268be6f1b4038b0051f2b8ca0ec

  • SHA512

    4474c88e366c796d501889c97f92e7c74461189378e1428ad580687a83cddca3c8db9fb8f6c89a110fb1fc601b80ca44af19c8b2db00b0569c49835ebef0a6a0

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTNyl2Sm0mKuC1TC14lZfAt/KeB+wkcRqbdM5EFi01iFHCUiU:fny1tE42EjliT+ERqbS5EE01iFHC8

Malware Config

Signatures

  • Renames multiple (278) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a119c01ebd4114c7207330b20759ec0N.exe
    "C:\Users\Admin\AppData\Local\Temp\8a119c01ebd4114c7207330b20759ec0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-457978338-2990298471-2379561640-1000\desktop.ini.tmp

    Filesize

    150KB

    MD5

    f79ea697066718fae5d4ed9aa523245b

    SHA1

    9e15d638f639e511ebb7baaaba9fdd1f0d1e2ca8

    SHA256

    0ad905a5530ee18ccf3fb653fa7ba013d7779cda5f3c1ea581fe2873270e108a

    SHA512

    8cd6fbb5197b4ece79018d9f45367815eed2ec13f777e38a47d936635b825662fe5be44a4c406261244c493c30f93633bd555edcd5cd7beef500d2b0967ba63a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    159KB

    MD5

    94d03a593ca9bd1aeb7b99e10e05de9c

    SHA1

    ef30214751c19a26908042b40af6a2a9057f70d0

    SHA256

    ca2062c4677c7aab887df4ea0f7ede1233a26c1bc8daebb661532bedef699e4b

    SHA512

    6a4f9c01017f4c38ee8ddba16f258fc4edd9e44b694c5c2a2e05b4e17700a0a968dd57f03c7558f5c661f1022457473442b16b22c8a723e05a163293ff977271

  • memory/2752-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2752-24-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB