Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/09/2024, 20:33

General

  • Target

    009d279beded6a1d1af30e8f0cf02780N.exe

  • Size

    97KB

  • MD5

    009d279beded6a1d1af30e8f0cf02780

  • SHA1

    be83301148f3ffaec5300b85a829d24181201fcf

  • SHA256

    7232c0a34e77ed7fdce07435f1e10dca71a87c8d0ef5279233ccfa7fa297c9cb

  • SHA512

    5a63d35cdc7bff12ed461568d11326f23faebbafeb03909996b9e8499981840d71164ecc5923451f23fd96a0b8912a0fef8a2d93906b3447ee1388c21605f7a5

  • SSDEEP

    1536:V7Zf/FAxTWoJJ7TzJwEpYBvkalreNSmIsFwzU4zjUkvuJrMlK9:fny1CigkMreNSnGwzckmJrMA9

Malware Config

Signatures

  • Renames multiple (2920) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\009d279beded6a1d1af30e8f0cf02780N.exe
    "C:\Users\Admin\AppData\Local\Temp\009d279beded6a1d1af30e8f0cf02780N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2104

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1846800975-3917212583-2893086201-1000\desktop.ini.tmp

    Filesize

    97KB

    MD5

    717f1def34473d84da58d698acb5d0a9

    SHA1

    5d3337def71c62ecb7671e5b1763af83b2a6e60e

    SHA256

    3a38099e84a447fc632ae1238f53f7c99024ca95527e2ab94493cd0c4649355d

    SHA512

    a45a95d314194556440884671fe8ea545a2ddf5b5b1f25ee3456f0b5c116843c97cb6849b58292a29fb0d0afb46ed7cf949d196a3d924c4d4daedd95093037ab

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    106KB

    MD5

    a20e6952dbe91d6774e92a0acacb5724

    SHA1

    e874533186886d69870d7ea45d3fc34d6a80a470

    SHA256

    0f7d32318b8574ef0b68e0ed595d83eca69ca49111ab44bad7f478a6cef66da8

    SHA512

    84d4736ddcabdd6aa279e4dc0b4ae9f33f5df1c1db7c23b1773a8caa57217772c788337fb70648f69f031b167636294c38ab8cee528532aeec9fc060f52b1454

  • memory/2104-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2104-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB