Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/10/2024, 06:08

General

  • Target

    9d13ecc5b70f7c39dab8795830b83e86dc467ef403bdf6b6e2c040ee04d2bef2N.exe

  • Size

    67KB

  • MD5

    c7173702fb56e61313c604a592262320

  • SHA1

    edab844a6e76be4bfa896a94634c9bc098072936

  • SHA256

    9d13ecc5b70f7c39dab8795830b83e86dc467ef403bdf6b6e2c040ee04d2bef2

  • SHA512

    e433773165ec49efb47a68eeeff5baf399767cf56e06f565cb99f9bd750bf6b60ef790befa3c9aa4f07296b8e120be3ba2621423fa57911267b5553815fff4ce

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFzM:CTWn1++PJHJXA/OsIZfzc3/Q8zxY57

Malware Config

Signatures

  • Renames multiple (3186) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d13ecc5b70f7c39dab8795830b83e86dc467ef403bdf6b6e2c040ee04d2bef2N.exe
    "C:\Users\Admin\AppData\Local\Temp\9d13ecc5b70f7c39dab8795830b83e86dc467ef403bdf6b6e2c040ee04d2bef2N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2376

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

          Filesize

          68KB

          MD5

          0c4fabdd247467ae66667c096cf38321

          SHA1

          cd9c973995becbd6ab1c70c4038dd0a46284128b

          SHA256

          7471520fcfb2af42b660dc86b9d7edab43e986feb5486a7abf409211c4ec1ea4

          SHA512

          829a648295b5b2fbbad56a6577a92390c0f5f141c620358d0a6e1882f743f2c61ad1da35c6d0bb37bb4659fe3ab7ac78f96caeafe43be225cccfc7753cdd03d8

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          77KB

          MD5

          fa9589b78020912038d5c80e3b26d8f3

          SHA1

          3c086f9e2c4ed8d2a5817243d4d2e04bebea30f4

          SHA256

          27a56c52e5afff79e404abec67795332a83fa54c0e5ec5aa2c7092b97dc0b2e0

          SHA512

          c7ced61cb25bf9fcb0e048ea8a3b2bacb2e30a82cb76b55f8ff1859ec79f2c3784c4b2708f1e12531dbabf19d74e39a5e00e019c52427076eb86131ef9ac35ae

        • memory/2376-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2376-70-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB