Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    06/08/2024, 03:17

General

  • Target

    4f1ac22df5d40d602a73cc36457fccf0N.exe

  • Size

    51KB

  • MD5

    4f1ac22df5d40d602a73cc36457fccf0

  • SHA1

    781637f61af611c53fade5426b78ecb44a97c597

  • SHA256

    e694b5da098968346d1939ed82e2e0084b294f8b22b4c1d424626c15ce353825

  • SHA512

    30fdd665f0228ee1dd6f1b9b868d16d82ba3b029242dc1585ceeea16f1a6fe04ed948562afa0fb115d43dadbc5dc4f0f6c38faa3790adca06d7eb9422dec9dd8

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJBZBZaOAOIB3jM2jMHsLzwzJELEp:V7Zf/FAxTWoJJB7LD2I2IHsLMB

Malware Config

Signatures

  • Renames multiple (2982) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f1ac22df5d40d602a73cc36457fccf0N.exe
    "C:\Users\Admin\AppData\Local\Temp\4f1ac22df5d40d602a73cc36457fccf0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini.tmp

    Filesize

    51KB

    MD5

    005a71a1d106c26dc69ff795c3806686

    SHA1

    75666a59d10c96c6e8fa1cadd3fa24508c16f297

    SHA256

    87ea855d36eec0ec0644bd537acb5240557524c1b27767e9e3cf4b319f791a19

    SHA512

    c328ca940abfc71f312bcc866e7aefff0a8c47fa8fa079fd0d4b84b5a0eafc99e0bc987403661c879c31dfa409ae4916ab7be7416adb33f280e10271e60bb854

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    60KB

    MD5

    a82b6752dbadcdd1f6d0455fa9fa46d5

    SHA1

    da915fc63608df299f91a9d4a67014eda32eaacc

    SHA256

    18e019d9bc904ba46fb7cb2444c9dd0d259bd098945d31c5375ae0f35fd9eeaa

    SHA512

    ea5347af3c81f3aa7a762da20e3d0ce1b1289ae49bbd779fa041f1fff33191a5c39e2fb90661c84963fc63a9fb4996eb39af7cc644076761096791de19a79005

  • memory/2784-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2784-640-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB