Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2024, 06:18

General

  • Target

    fbc9d6c16af3c1d38d852057230d2996928c9ee5ceab54445962474f4698fd76.exe

  • Size

    44KB

  • MD5

    465e5525d43295aa1c05a821bcfc7674

  • SHA1

    ea6bd4e27d4a6971ea0d1db7bc1d7eb56b5f54c5

  • SHA256

    fbc9d6c16af3c1d38d852057230d2996928c9ee5ceab54445962474f4698fd76

  • SHA512

    9351392b8d21ed2692a5e0fe32edc98a878be15cd3773a63cfa85431e82d16f244f2f9f10530f457fc3cd902a88c9e5aacac2a69beb96c66609d6d05ce571ead

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcwBcCBcw/tio/til5z35ztFp:CTW7JJ7TTQoQlRr

Malware Config

Signatures

  • Renames multiple (3828) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fbc9d6c16af3c1d38d852057230d2996928c9ee5ceab54445962474f4698fd76.exe
    "C:\Users\Admin\AppData\Local\Temp\fbc9d6c16af3c1d38d852057230d2996928c9ee5ceab54445962474f4698fd76.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    45KB

    MD5

    da33d6a9fb00d9a701ec05ab658f6826

    SHA1

    7a41708ce9bc7280f334ff98c8772289b7ac3400

    SHA256

    e40df32251dcda026d399b760b43a09ea56219118cb3506f566870987ab00403

    SHA512

    dbf67985562061ac123a2573e8c2b3a25a5c71fcb936a59a6f024fd6e3094f4c2b604454e36cf01a98fd02fb5dc4da9505bc4334272e26be018cf00f57b41861

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    54KB

    MD5

    edf553875ff5970e9e1fd47b2b8d1891

    SHA1

    dde0b2ac394f649604591497e3b8bb9b1b371120

    SHA256

    3c80dbece9772bed1081831fb53a0a4f62d408a43d3ba8f77127b8cff112e5fd

    SHA512

    aabc58d6558e8edf351a4e7071e9724bb2ef79fe2dc27675da793def57c5f686d1d883037678dd88f40e0712e1d5dad7e04250fe05c4e189fea37cedc5419c60

  • memory/2364-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2364-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB