Analysis

  • max time kernel
    150s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 08:34

General

  • Target

    9a08c60d5b03354210dc479f26500dd067d6f7182009e02504cf8f065c30aed2.exe

  • Size

    109KB

  • MD5

    aed57497d961973973568cb5d1fa4bda

  • SHA1

    7303d31829c3dffd8b7f4f79e918b4aa90b7f974

  • SHA256

    9a08c60d5b03354210dc479f26500dd067d6f7182009e02504cf8f065c30aed2

  • SHA512

    7bc86936c9ada3ef87ed4416bd7ff1dc79b5ee22a2bc4f17ee9fe9bae82775402d9bc2cf28cfa071a24a4c0bd33d1ed8e8421ed9ee889d91f0aed5a7eda3fbb1

  • SSDEEP

    3072:fny1tE2tEtyKoIWbsHfySkT5GeCyi348oWGRPOzkjId6q8UdrSD+kCoIfL2YwqA0:KbEeEz

Malware Config

Signatures

  • Renames multiple (3436) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9a08c60d5b03354210dc479f26500dd067d6f7182009e02504cf8f065c30aed2.exe
    "C:\Users\Admin\AppData\Local\Temp\9a08c60d5b03354210dc479f26500dd067d6f7182009e02504cf8f065c30aed2.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2300

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    109KB

    MD5

    854cd1e625f404cb9444d5d6d298c6dd

    SHA1

    064d8cc37d9583dfde54c70ed4380aa0240a1ebf

    SHA256

    ab9b48af9f62d00f2c5fc0c36f169eca2f5578f9684737d5d8cbbc459501d110

    SHA512

    9dceec7e44bd5a08252b0a2401b3bc9f90d81253003e06b4bdbdb451acfe7c817cedde70fa85a1c368d4a613c9a615a6842ea446ef7921f401b383578dba917a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    118KB

    MD5

    56a776478e134a2554338f11daeb43b9

    SHA1

    0d68ca3ea5b38824579d3520ce4963e09a7cabac

    SHA256

    aa68a06098945586e30453b4aeeaada254efb7df1f209c55b4d4f4e29879a367

    SHA512

    8c05fa61dcbb656231019a77dd124bfb91f0db6039063a6de9072b51bf10a9e9b16bbad36c388fc808b5cee105aded9a88aeec93fec880ddfcb800b6f631158c

  • memory/2300-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2300-62-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB