Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    05/08/2024, 18:26

General

  • Target

    bf62cb5c6c5359786dc639abfc32a9c0N.exe

  • Size

    75KB

  • MD5

    bf62cb5c6c5359786dc639abfc32a9c0

  • SHA1

    83f6c6a8d3a4562ceeaf0e50cfcc4da050ec5ef8

  • SHA256

    575ea6ac6dab3074b6015ba8a2fac9eaea523fd1f5cf9e64232cde9dc3323fdb

  • SHA512

    0c0754cf7f76060f05ebe3eefeb1346a976c8cc019ffa9fe2c9b8d6dea0f30e8fe77f1d3cd16050bf87d774797b9e7ae480f7c459972a00871f750eb6c90e08f

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTBb7dsXDZklYGCYusule9v:fny1tED7dsXDZklYGCYusulq

Malware Config

Signatures

  • Renames multiple (3096) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bf62cb5c6c5359786dc639abfc32a9c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\bf62cb5c6c5359786dc639abfc32a9c0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2724

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

          Filesize

          76KB

          MD5

          808dad17db7036157297772427bc868e

          SHA1

          1142914d66de4183c9cb20eb2a065847489c848b

          SHA256

          8f44ec89589efaf6ae3f5e3cc36f9fe42066721936ebab81bdab1c996834fc6b

          SHA512

          72b2ac19f95c189ea11cea1329e712f84bcb02f0f02059e3dd0d066f8eaf91bb488af4ef577d0ce23ccb6e95781f7515b76df744ef9749935dc094a195c3d163

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          85KB

          MD5

          d3953484063729fa04acd63dac666a48

          SHA1

          a5b66acb646d1be5695cbaa9ba8d43481a598661

          SHA256

          767134c210cc4d1d0159285a52e9cb55f3e9df85bf3696cd57cc49433d013740

          SHA512

          6eba3f9fd796b13962453d84d5102c2a9d49cacfb4a03e3f9c80e8b50c1b1f920933f79e2541c28147c76bd997096f02e30f9b4773b04a3f1a5bbf9e6d4b2664

        • memory/2724-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2724-650-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB