Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2024 16:02

General

  • Target

    6941a9a55574c5f209689028c008d4c8a49de8c9a62a4df3004582c222a8e6f0N.exe

  • Size

    94KB

  • MD5

    87982f67d48731009d4b94015eaba170

  • SHA1

    19e7e7941b42ebb999f48c46a13efcb777d8c79e

  • SHA256

    6941a9a55574c5f209689028c008d4c8a49de8c9a62a4df3004582c222a8e6f0

  • SHA512

    b53793a389b2bbcb21fdeaca04b1e3a08fcbf61a87ebf78c48186fa1072d27952ae4bd0fef9acbc189e5cb42fd556add6f0aec70dd5fa7d6b94b149057a3692a

  • SSDEEP

    1536:V7Zf/FAxTWoJJ7TTQoQfTW7JJ7TTQoQlo:fny1oRooRS

Malware Config

Signatures

  • Renames multiple (2934) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6941a9a55574c5f209689028c008d4c8a49de8c9a62a4df3004582c222a8e6f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\6941a9a55574c5f209689028c008d4c8a49de8c9a62a4df3004582c222a8e6f0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1846800975-3917212583-2893086201-1000\desktop.ini.tmp

    Filesize

    94KB

    MD5

    2bef07e7917c1cd6b1e4a0adfce8e5c0

    SHA1

    6da7a11b2f99393a910680aad49e1b40c8fb7482

    SHA256

    a0bce0673f5a71aa165705d5182b1bad5dc2290a6e475e13ae42e444ab3e433a

    SHA512

    68262c682256f2747a6a692ce28caae678ef525f03598d0f59de9a1be79b7e2a18a45c7ae48582f26f7374a84bf70398f077d5702ac101b6e63b9c7f2a5d10b2

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    103KB

    MD5

    ca753996890975005a9a24b1d29e4bda

    SHA1

    c8adec82e62c84815ee26b5c7b7ecfc980b2324f

    SHA256

    673c3c158832a7d4630563e3e8575886feb3d722c89c1895caa162b0819ac0c6

    SHA512

    1f454945de458a0be0a5c4e90b7cdf9427f30a0207748d5df865da40b38563ff5c12ce1d2edf96d355f8f36141ec81dd0a6385e9a0f1075ee8cae340b5b9a8f6

  • memory/1868-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1868-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB