Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    06-09-2024 01:41

General

  • Target

    89c696f3aa7a6f44b948049a8208f060N.exe

  • Size

    55KB

  • MD5

    89c696f3aa7a6f44b948049a8208f060

  • SHA1

    ebb90a62499a4634acc37816072038acd0538f1d

  • SHA256

    9b6c0062b78be72d1d23faabdd2b1e71461937cf53c37f22a0b07d731660b430

  • SHA512

    808efdda51f21c5bb61457cf72c3574035194be19c29573f78d05ce40ebd67fe04a8419c148f905b789f2aee7551314ac0b48cfd3d263ffe2a955eb0c910edfc

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATNydWK9WKF9ADJy:V7Zf/FAxTWoJJZENTNyoKIKMk

Malware Config

Signatures

  • Renames multiple (3201) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\89c696f3aa7a6f44b948049a8208f060N.exe
    "C:\Users\Admin\AppData\Local\Temp\89c696f3aa7a6f44b948049a8208f060N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2496

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    55KB

    MD5

    9610c8a73efb6832ef9f1cbe2995c26d

    SHA1

    8fb9c7fbc1b6782b3558e69f3922ee281e78b080

    SHA256

    1ec3886331de7e19bef7d8498c8dea16891e7aef1dc8f3a1de2c5eed62e5004b

    SHA512

    327df631bde5d736a0b78b99365c70e0409ca57bd3dfb7a51218932162c834c3c6cbe9f1dcceadb0c6f1a06dde98543b1f3e22c55b95230a939c5f66333d5a1a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    64KB

    MD5

    6d335a390c7b74fd3b52325b6d78cdf7

    SHA1

    f091d536b802a58aabbd4f97a819e2c078920b5c

    SHA256

    47399f4137673801b27b30c96886ab9ed9802b0c50f63bc2e4e6873580892d9e

    SHA512

    db16ea0b7727c7f88871d72848e15b2eec0eeed93a0f2c09078988a9713361717d6c1fb4152a286b48393ba35f973fe8755ff902e03d1725ac93376d05de4d0a

  • memory/2496-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2496-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB