Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:22

General

  • Target

    0967881fed3925aac923ad17dd1d0fa05acc718c067178f998c3375344992aa7N.exe

  • Size

    39KB

  • MD5

    7c1ee5ce58a2645da50ab7c917be66f0

  • SHA1

    e3cf89fc206c2c3c49482adc4526dafbfdc0e945

  • SHA256

    0967881fed3925aac923ad17dd1d0fa05acc718c067178f998c3375344992aa7

  • SHA512

    034b10ca8f8f69e54579aa9f6a66b1cdcf43999f534b41f4cda7bf8d6defb2f78e3c33b1edf2d720afeae2e2e3d67f00334f0c756f801ac05edc2a44ee9f9bae

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9DrcwwEHUOwwEHULCpp:CTW7JJ7TVrU6ap

Malware Config

Signatures

  • Renames multiple (3851) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0967881fed3925aac923ad17dd1d0fa05acc718c067178f998c3375344992aa7N.exe
    "C:\Users\Admin\AppData\Local\Temp\0967881fed3925aac923ad17dd1d0fa05acc718c067178f998c3375344992aa7N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2384

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4177215427-74451935-3209572229-1000\desktop.ini.tmp

    Filesize

    39KB

    MD5

    67a3206123c6e91668a8f28035215fa4

    SHA1

    7998d076c7c5ea62fc7f06d8a86bc5c2a1fe20ed

    SHA256

    543ca2c52222306e65dde5eb1f40cc8c57bdc0810eca023cf8b924538774b440

    SHA512

    4ded151862ae59f7d6c3908010b63fb5c87fcf38884684d2982b17304b72685f5b4d2e65aa1114323e5869c7b6387fed3d6f9ad2722e4e7097b3c69a0ec9e329

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    48KB

    MD5

    4cb22ed3b0f77a2850b2db4794d117ca

    SHA1

    cc15a74e494eb7bcf790b8cb9c8d46e2ca8f6060

    SHA256

    d73b0b6b300e8b044b39e2bcb7900be3aa39a7a807c7e682e7149eae96a37711

    SHA512

    7c50f491f10a1e4e6aba0807ad1185d9b554b8bbf0183d266ad19740d8597741494cfb6fc6e95955a0790d7c13f8940fa0bd9a3642cbb7d1212b6d0f5e202e37

  • memory/2384-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2384-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB