Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25-07-2024 20:02

General

  • Target

    f1bb6cccee7af7bd69614de841f94190N.exe

  • Size

    49KB

  • MD5

    f1bb6cccee7af7bd69614de841f94190

  • SHA1

    60e1d9cf4cf00888281e1be7a49cefd166a446bd

  • SHA256

    0916ddc876bad2dd9e81adf98cb453b58d0f518a8b4d6832dbc0e0d544cd5b2e

  • SHA512

    e14a512f75c355cc5c259b54438c5b7faba60a3136bbc527f807d1076c07e6edbaccc4355eb553705add9cbc2a392128326723d5dc28c1aa712e94c63181d4b4

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATNyHF/MF/VgnL:V7Zf/FAxTWoJJZENTNyl2inL

Malware Config

Signatures

  • Renames multiple (3138) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1bb6cccee7af7bd69614de841f94190N.exe
    "C:\Users\Admin\AppData\Local\Temp\f1bb6cccee7af7bd69614de841f94190N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2380

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    49KB

    MD5

    1890ccfa7028caee32c37cceb8e227a0

    SHA1

    a41b35eaae5395521309bea8cdce263356a72910

    SHA256

    2a4ad2aa489ae0fbd1621f24b321b96fe77b4fd3d0e831b8ed2fc3e16f247c4c

    SHA512

    e493e0cee1bd342a58f9861161d5fd93ff30ffe2e1559b34c7b01927a1ab2de7383f32eeb395fd457b956527908c62c094a7df4db0b1218fb347cf0664023091

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    58KB

    MD5

    5f51882fcc7cdafa6ade35cabd9c8183

    SHA1

    a5bf6410a0d09937eba32ec11e8f053e1fce81f7

    SHA256

    b83059f6155240febb81cea19240e42c2b91e117f558d9efe9fec82fe3053871

    SHA512

    58770d0a9c0602ccd7e6ae960f93582b1a27c6be95a59ddcdd73ad51fd8304675f10112494b4542533c9caa304c85a32630062a13b0bce4d9fafe3f2b1a534ee

  • memory/2380-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2380-640-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB