Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    05-08-2024 12:45

General

  • Target

    8fbbc4a843c9c854779fc215d1cc34e0N.exe

  • Size

    57KB

  • MD5

    8fbbc4a843c9c854779fc215d1cc34e0

  • SHA1

    5c302058036612771fd244aaacca94f59ed0372d

  • SHA256

    fc28cd748741f8886b3321c97587ab0695f15dc4f37ad855cd1f034851ea3989

  • SHA512

    35da8fa07e4d83ff3bec6c65352964e8fc297f747ef0a97dca4467bc0dbcb3c0373b34e3852df9ae5840b76b5652cfc42b04a9aa8d2ff1aa55d3973a32490703

  • SSDEEP

    1536:V7Zf/FAxTWoJJB7LD2I2IHsLMzgGYJ5OngGYJ5OU:fny1tD33HsshBh6

Malware Config

Signatures

  • Renames multiple (3155) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8fbbc4a843c9c854779fc215d1cc34e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\8fbbc4a843c9c854779fc215d1cc34e0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini.tmp

    Filesize

    58KB

    MD5

    cecef9685cb92ab7ad163c8d444f503d

    SHA1

    45469e162b56ee35d34ef037596c6c71488f87ad

    SHA256

    90421e23557aca64594b676e85d276a347b25b288f02c35a71b0fac04c7dde7d

    SHA512

    8015a648721d5816a86c8e08d5c963059ba6959a8db7b32724d7bcac67a2f2c6f4dda2b6927af6e0b93a3b580c4e104880b6ba3d36bbdd3db079a3090747f2fb

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    67KB

    MD5

    81f76646eed5024e0eecda68a9e61855

    SHA1

    ccabe559f5df38ee3b2deda1c53f0afc2171237f

    SHA256

    09db13467900eb49792f88cffd2a0a90f37867242fd3516befc825332d62810e

    SHA512

    58dc085823d5152487ec80a8410d2c24150e690beb222fab2aed818fb409fa1a1cbaa62bc027e94f41e631dc7d1a1662807271499e5adb6d554f37412268868d

  • memory/2680-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2680-652-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB