Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21/08/2024, 19:23

General

  • Target

    fd7bf111acde4611ea2c1823d54bdad0N.exe

  • Size

    71KB

  • MD5

    fd7bf111acde4611ea2c1823d54bdad0

  • SHA1

    e6cc85b08efea4430458d7022399dcfdf5f2914d

  • SHA256

    e6975448c999af4559bef41a38293019abded7d6283685b058029ce292e8edc8

  • SHA512

    be4449e56d5b81734fa55e0bd220640f08fbdaa80a2166cf250fba000b160427856595678dab6947209bd5c9b250980a786bc09e4413966775971ee838fe13e9

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9ABT37CPKKdJJ1EXBwzEN:V7Zf/FAxTWoJJ7TsTW7JJ7TY

Malware Config

Signatures

  • Renames multiple (3117) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd7bf111acde4611ea2c1823d54bdad0N.exe
    "C:\Users\Admin\AppData\Local\Temp\fd7bf111acde4611ea2c1823d54bdad0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    71KB

    MD5

    0d09234080844a350bc5755cfba7fe0e

    SHA1

    6e3103095b827502ccfe7a558b0d92adbf64e44f

    SHA256

    f28c8cd03a198dfee48efdb18b8b0716dcd4cbfafde86e30bbf124a456a442e0

    SHA512

    f00c123af8f444f539d168b05e592f84965f87ff15bbbeaea73947fc16035b49972199b8de63610dafe80ffb6548de80a7ca81e6e9ffff7e34d255fda06f2fc8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    80KB

    MD5

    5e2056f0c04fb2d560f2acc6f93b4a54

    SHA1

    532dd23e1edf71e6cb4b4a933bf2f293d81cfcb8

    SHA256

    9ccaa16fbbadb062a3f826a06877039a838abbe6e559906f0ca802a8de4ddb79

    SHA512

    bac01d7603eb2609ab0128f852e0e2fcfbc41fa419fd045169b8da1b02cbd46bf1376227cf4d518e633b0a0b700ee84ed06b84fcd625af65542a09be0e0863de

  • memory/2624-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2624-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB