Analysis

  • max time kernel
    120s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 13:49

General

  • Target

    923aac0ed1c6dc1ef2adbe09e76947c0N.exe

  • Size

    40KB

  • MD5

    923aac0ed1c6dc1ef2adbe09e76947c0

  • SHA1

    5342b5162c5b18aab525f2c5864ff1a54f89b007

  • SHA256

    f5583d8152c67c56a981fc87151c189c0ab5fb53f129cf8df8632c85c99039f9

  • SHA512

    2156f0263258805e270541a7430b13a6cb93b2789810d765a33ab9e3cdbdc3d4c77529bc9b6f403cb632578dc533566bd1de93f0491b26764ad3ff71df3860fa

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcwBcCBcw/tio/ti2Q8Q7:CTW7JJ7TTQoQ1f7

Malware Config

Signatures

  • Renames multiple (3461) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\923aac0ed1c6dc1ef2adbe09e76947c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\923aac0ed1c6dc1ef2adbe09e76947c0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3063565911-2056067323-3330884624-1000\desktop.ini.tmp

    Filesize

    41KB

    MD5

    aa7191cb917cdd855b117d27cf843bb9

    SHA1

    4cc65d601a7790527c10076fbc9f619e08f19eb1

    SHA256

    d2e677538c0237beba8e85d8c8b53e2ab94fbd0d6ded5e517ac4133223124547

    SHA512

    70088c940bdb0d1953a32b5cc037972232716e94920aa2677089da6dc3afa44a0eea93445db6fc2289925e5413d2a691db92c43720a3774c5077683ee2f572dd

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    50KB

    MD5

    19f7825c6e013277dc9fa7a3d9d153e4

    SHA1

    c933e2359c62a22972e6973409f0a02b4489223d

    SHA256

    352bd0a28d5e916efc32e74c4ac2db5d2ef57bf6087d87433361eedfd8c1c636

    SHA512

    8238f6143aa025caaa9b57d619730c2c78a2e72f54bf9b6ebce87934c3514ed96fcc9d2b7be2fbf0e748abf048deb0cc37aebc2eb756a202562742dfd2523c98

  • memory/2188-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2188-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB