Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/09/2024, 08:18

General

  • Target

    c91658f0a08f73a863b30e9a93ef0000N.exe

  • Size

    61KB

  • MD5

    c91658f0a08f73a863b30e9a93ef0000

  • SHA1

    c0c7290fdd12efb557e7964d7ec3a517b67ac165

  • SHA256

    26912bf6629ee4af0c6930c821096981b279246dd773c72a0eb92d79f7f0601f

  • SHA512

    befdee09378151fff04b6149f966a39ffa98da80d54806ab1c6d85a3aec06687e55ae7c21b2cb522cb73c45ed0ec374b7b5c3da807df5ea5d2b159236e8f24fe

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcwBcCBcw/tio/tiz9CQCh:V7Zf/FAxTWoJJ7TTQoQz9CQCh

Malware Config

Signatures

  • Renames multiple (3238) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c91658f0a08f73a863b30e9a93ef0000N.exe
    "C:\Users\Admin\AppData\Local\Temp\c91658f0a08f73a863b30e9a93ef0000N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-312935884-697965778-3955649944-1000\desktop.ini.tmp

    Filesize

    61KB

    MD5

    f207dd355daddbc39be11332340248f8

    SHA1

    01cc1f40fe307b2b7de801e311a9e494e580c056

    SHA256

    e1ee7473f879be0920febeb697d2100f5f305c2680ded796442d3a427c5f2d7f

    SHA512

    3ec03becaeb94f3553492918232198dcbb1e47a253bc22ada8470646bf504f535fc72ba4f708bfb6303cf6da53e49b51968fcd51ecfc75c49174408ad93b924c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    70KB

    MD5

    1c2f61dbd23e6772cf00339e906443e8

    SHA1

    02189194ceef2ab370ecd84a5eeb8384d76d12a6

    SHA256

    6748be313617d66e003d45ef120d9aeb46e0a7e0c899b36f1041823129c40341

    SHA512

    61b3653a923b7925f42eb216a3a6378309c30d86f53653213560fc9a354cf5158c150f51bb7852af85126eb1cc4b48bfdd24a6dcaec4ce59154d76b4a7eab613

  • memory/2756-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2756-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB