Analysis

  • max time kernel
    120s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 19:18

General

  • Target

    f77e62737e2d6aaa2ac6ad3fd4d07a30N.exe

  • Size

    42KB

  • MD5

    f77e62737e2d6aaa2ac6ad3fd4d07a30

  • SHA1

    375db6dd1eb7ad7c021525331c26d7fb21279d39

  • SHA256

    73629ed22124509bfb9d9eab08b83d9837a48317eaba82a579e09a54b0df6ba6

  • SHA512

    fd2c3c43a8fdc89aedf502759ee08e2bd6eabb4c88752735bc3fd4c20b22d7b8d793253eb3f9d46a06536f42670a01e1d9afa04e8aeee6871abcbdee393b54c3

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcu90TKe+0TKeIiKxW:CTWJGpG8ntmr

Malware Config

Signatures

  • Renames multiple (3452) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f77e62737e2d6aaa2ac6ad3fd4d07a30N.exe
    "C:\Users\Admin\AppData\Local\Temp\f77e62737e2d6aaa2ac6ad3fd4d07a30N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2864

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini.tmp

          Filesize

          43KB

          MD5

          570866dad9c8d55d262ec201d193af52

          SHA1

          219cd27c3ade9d60ca43bc7ce7468de43b4e141a

          SHA256

          adfbafe076718554e0f9833a447e2b6d992a3208c3e92b772be461c14caf6232

          SHA512

          14d1c91e0a6673c83b46bc1dd1062762f2d0bfdbde5cf1194b90c81c7fbe87871792d6fe693195d2f40099dba3906d75dc725015968c2d50dac52ba066f99994

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          51KB

          MD5

          ca5391cc004bee1de9fdd315c9f6150d

          SHA1

          ecfba652e1f156533f2d2d75a03fa146a3be58b0

          SHA256

          8c7d785ebca86759b2ecfc8ec2380b1ebbadb0ff9ca830a30c2f5219944c4b72

          SHA512

          a0f5d0570d95fb63b31d35709329f361bd13407ad0eaf987a0fdafafed229f08f0892b6042bfd7db08523ce5a5d73de2f367201b167a5b6e7f5509f4aed5af2b

        • memory/2864-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2864-70-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB