Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/09/2024, 05:32

General

  • Target

    9b341ecc993e95938e5df96e4e150c50N.exe

  • Size

    45KB

  • MD5

    9b341ecc993e95938e5df96e4e150c50

  • SHA1

    8487d49143251c1c7423f62a42cb9817ec6bb09b

  • SHA256

    e540f32e99e7d1fab74e82f450a727ee2104f38149e58b09c6b01b565b3fda2f

  • SHA512

    cc5b77d56615182f53c26b278fe3c2cb38560b7a26c3b472b66763b42807c565986cc7eb5ebab1090dd2d3fe25d58374bfbc86f6504a28e5fadca42a78f680af

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9HXEpwuD7I/pwuD7I5yAohGCYyAohGyBfk/BN:CTW7JJ7TFXCwnwDy4CYy4Yfkpfk+

Malware Config

Signatures

  • Renames multiple (3223) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9b341ecc993e95938e5df96e4e150c50N.exe
    "C:\Users\Admin\AppData\Local\Temp\9b341ecc993e95938e5df96e4e150c50N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3533259084-2542256011-65585152-1000\desktop.ini.tmp

    Filesize

    45KB

    MD5

    cbecee7a53fce365170eabca6e58c813

    SHA1

    1c2ad4efa9c2202794325f34b6a56921fce9fe6b

    SHA256

    3ec29b04b0c3b4884b5080d898fea61c0ff6a434df36547ecc7f5a8c2dc5fdd8

    SHA512

    3bccd007ab2a8226bc852ee333df3cfc21fb48855ed8788c8f9ae4098a9af6017175e12cbc6368e84e696b65e412cb1cf558e7336cabded39d953a0a874f4ccd

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    54KB

    MD5

    72d48e5856004744ce65834eb603941d

    SHA1

    b997d4604703ce3f4010e1ad83b0c104221f7018

    SHA256

    6e4ea206c7d057e2d7558059e16f8676a1ff0615b752a8a060cd7e9398e6ac53

    SHA512

    918feb25460d930ea09ef046b47045547be11afba7796bdf8f2f9262444184136ae544a2c0a49b99d15a9291e3a3ec6623b51c3d6af370829c6f09b660d2afd5

  • memory/2504-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2504-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB