Analysis

  • max time kernel
    120s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    20-10-2024 01:14

General

  • Target

    9ea787c2a7480585736a58778cdb6f3b61c80b48b7d3b5efa8a73f6d55a57428N.exe

  • Size

    87KB

  • MD5

    75e6fecef7e57fed83b33de116c31fa0

  • SHA1

    9ac5c557f4c76badc532931ac4c6f87078b49419

  • SHA256

    9ea787c2a7480585736a58778cdb6f3b61c80b48b7d3b5efa8a73f6d55a57428

  • SHA512

    fafca9d253a35859e52c6b06f715e252c3e3eff7f1bba2df9a3b8157c8d36794bc664692a701c2a03e748788b414cb11d26cd84893e56cdf65fa48cbb7771429

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxY5Kwj2rR:fnyiQSox5Kwa

Malware Config

Signatures

  • Renames multiple (262) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ea787c2a7480585736a58778cdb6f3b61c80b48b7d3b5efa8a73f6d55a57428N.exe
    "C:\Users\Admin\AppData\Local\Temp\9ea787c2a7480585736a58778cdb6f3b61c80b48b7d3b5efa8a73f6d55a57428N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3692679935-4019334568-335155002-1000\desktop.ini.tmp

    Filesize

    88KB

    MD5

    a9c3ee186956fb579b6dda2fb3aef7ca

    SHA1

    151e640436dbe72a0d17076dbcc496e913feb29e

    SHA256

    4a2200264af778c431d17284aa0913164c5d07ed156d5179e09ac0e4b8374ee4

    SHA512

    e72c29af5fb8384ac2887e4253922d7f821669c4eead0f68041c7086ffb22b1b746f431c1ec97d4fa6bf1ad5ee51bc623fa0a2fdda1057a620a5c7be8cd7ceca

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    96KB

    MD5

    28c67c6621989e6562fa74bfcb76adbc

    SHA1

    a9ad6a1a2f896febc42540ed6db92366d9d9e25b

    SHA256

    2981a52ceea6148d5c5a507dae7fbdb285dda6152c024a1a02a41f3def8d87d6

    SHA512

    8bc3dcd8aede48d89fbcf6732e3a2c286833d8c55e8fcd9ff738ee103ddd81c04ea4dba5c830b67fb17f8ccd19ad2366aef85a640606455e7a2150d91fd98f33

  • memory/840-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/840-20-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB