Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    21-08-2024 17:27

General

  • Target

    6f3f88a300ff657cc48332b20f2c8970N.exe

  • Size

    85KB

  • MD5

    6f3f88a300ff657cc48332b20f2c8970

  • SHA1

    eaa7298f035ff07e1d0660b8ed231ddc3a00acd6

  • SHA256

    5e0706af1d81dd7b1c478e2c7e2864354eebb32701b92f087a337746bca8778b

  • SHA512

    a2d21faea77df5a1471a6e3eeb13d6fcbfec391d482d1dd1877b5b49d726009c06625f1c4578291fcbe3bc8fea0166c5243525be05318fae671a1e0a5c4399ec

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxQiKJAWJA0:fnyiQSoP

Malware Config

Signatures

  • Renames multiple (3065) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f3f88a300ff657cc48332b20f2c8970N.exe
    "C:\Users\Admin\AppData\Local\Temp\6f3f88a300ff657cc48332b20f2c8970N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1304

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    85KB

    MD5

    e58990bab8d6e56334b3a1779fda6ed7

    SHA1

    8066f85d0a2fa3a64e0c8f4df8da532d6c5e2dd2

    SHA256

    5993a70435bc59eab35aabe6153d14d9b8603cfdb5edaf5d850e62e6a57e71d6

    SHA512

    68fe3485f994295fea7e0a955c961cef19a7e8b9085cec5350ca0fa77b691f83d7342f964df07a3fb5bbd0362280e83f3c84202eb57fc932c27f5da4773fe899

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    94KB

    MD5

    22f94ef7b503999b8fb7c4770d89e9d9

    SHA1

    c863428e9df791ea94d8a5800b9e60b758137ef9

    SHA256

    ee582bc4542dbb214d5f2c750fb79c782036f4f6a4a3090010e84db65bde0a2f

    SHA512

    1612143aa939f8e459d4f8dd037400443197b8ddbe9381f5b0e9a3b14e30642ed10f42afd85030f6ff7fec54b1462dfdbb6de76a7e9509297a8f549e2e15f7fd

  • memory/1304-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1304-68-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB