Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    16-08-2024 23:13

General

  • Target

    6fba78d7e616f15cd698f8a289a91840N.exe

  • Size

    81KB

  • MD5

    6fba78d7e616f15cd698f8a289a91840

  • SHA1

    e098f90df2d9e119cdb324805b95f3053ad9915a

  • SHA256

    c3edd192ca28d46b9ee01a3111d3b06a76461dcd73629186fd7d903e5f1bfad7

  • SHA512

    4d396583591854347ecbb40259fced27c16f88d0757f601f03f76211682a026b4bb2da8f85e918851621fb33da6bdce9ec70c79c9cf68210a81bd504b240a132

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8IZzaI:fnyiQSo7ZzaI

Malware Config

Signatures

  • Renames multiple (3143) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6fba78d7e616f15cd698f8a289a91840N.exe
    "C:\Users\Admin\AppData\Local\Temp\6fba78d7e616f15cd698f8a289a91840N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2257386474-3982792636-3902186748-1000\desktop.ini.tmp

    Filesize

    82KB

    MD5

    5d2c861540f56b9086280dec3eb3c10a

    SHA1

    e745031a9f87161b30045a241d149edb62fe6569

    SHA256

    78387f4130d95c7a6c751695e0ba0db366b733ecf0d1cda9d6ca396c0dd905db

    SHA512

    2c8c1ba0114a9654ef2e586dbe071718090f9bda21b373b3b4b9c7b7aeee8ba16f4ad11f4eb5bc1cc5669729fc82f827868db1d3ad29c0136b62eaf0cedb0672

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    91KB

    MD5

    97c9abb72e96622510bcfdd1f9bf67a8

    SHA1

    70b8e713215a3deae97b2853843ab2f8f011b01c

    SHA256

    d200c994f1118c1f98c8d661506741949221ba8af2ecedd84d7c79ba7455749b

    SHA512

    202e6a52593a8635d288bc42e51b5d035a7955a8e05f7deb0330a1b5998076a8d3706bbfddb2149a3fd9b379033936f667c3f85e229029545a105eca927f6ec0

  • memory/2716-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2716-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB