Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    14/08/2024, 05:25

General

  • Target

    fa9df6b1848c875360521a9f1c94e740N.exe

  • Size

    34KB

  • MD5

    fa9df6b1848c875360521a9f1c94e740

  • SHA1

    8c4165d7c529b5a6f0607ab31b6d88ff21be2b2d

  • SHA256

    b0171e97bfb1c137b52484e17150a0fd178f8922e23d99c3013bad12d54456e6

  • SHA512

    3c15e29eec0af0ca14b24e21662472b85ed3f5288922d2200c4c7555b344fbeb168dfd2a562e206739c38b05eb1844f295d172023bfa4b56570575ca2a6a9f5a

  • SSDEEP

    768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATNydWK9WKvhp:CTW7JJZENTNyoKIKP

Malware Config

Signatures

  • Renames multiple (3284) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa9df6b1848c875360521a9f1c94e740N.exe
    "C:\Users\Admin\AppData\Local\Temp\fa9df6b1848c875360521a9f1c94e740N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2728

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

          Filesize

          35KB

          MD5

          65cbc38199d65941f2a6062417bfde02

          SHA1

          0c2de3ca17135a5274988a0e0d11e36c45d9eaf1

          SHA256

          deb6bf193c6a596c84d6753588780a43b4b8295fb85cae7833b1c44eb8338f29

          SHA512

          163a80e9643ecc3d59cda942b3c41297a23ad2c4a5eb898b8ab1a245793589e8231c5490cf368ee4d3898f0401bef813a4bcc4043933e808d5c31a467ab6b198

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          44KB

          MD5

          6ad52c4ff42689acd15cf151870457e9

          SHA1

          4ec929d3615700c7dee34e1d629ed80555a64202

          SHA256

          9100c577fbbc095d169841aad656facc19b34c675f8acfa5e3f49fdb0f2c4faf

          SHA512

          c4ae9d587107874ae969b4e0e1e0eaf374da39c3d98ca7f99bdf0c88e35816faa04c2785f333e52ddf5d3a08c3323e785908be7fef7bc1e9256ee31bfb0a3d87

        • memory/2728-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2728-86-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB