Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    28/08/2024, 23:21

General

  • Target

    f29b7b66386eb53d288b3ede5dc6b6b0N.exe

  • Size

    65KB

  • MD5

    f29b7b66386eb53d288b3ede5dc6b6b0

  • SHA1

    6d09e8945a6d2d520deadddf5017cd6a335a4d75

  • SHA256

    f28eb19c1d7b0a6ec0728a36e05f4ecc8381c8c6306f67d58d73761037065d81

  • SHA512

    2c3984ae9c1fbb81918d678b365aa796cd73787d575aa924df513fd0de65309c0d1888017f26cbbc0faace2fdf72a603ea512942a55dc9a21eddf1b105379fbb

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFz9:CTWn1++PJHJXA/OsIZfzc3/Q8zxSL4

Malware Config

Signatures

  • Renames multiple (3257) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f29b7b66386eb53d288b3ede5dc6b6b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\f29b7b66386eb53d288b3ede5dc6b6b0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    65KB

    MD5

    a05d4add9cafecc5935eca948910a23b

    SHA1

    1199d4745a180ede1767a42fc3e54212061c5b10

    SHA256

    47f8a8994d9a159c4e2e62aac1b46da979e13bc36acd4d478fe95ac2f0ccbe87

    SHA512

    fca25defb4cd54488ded1d90b12b9410c10f7a798eaac0cc4dc0f3c9916d3d5c7b2e0123ef7551d53ea6abe42f0170ca97046819e851301f0333a1ac46793fab

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    74KB

    MD5

    b54ab4242db1547d12a804d1e66d7c02

    SHA1

    d073d1bd545adfb25025219f9f0958246b3a3a7b

    SHA256

    00618a8ec816871001147299c5fa73c11c4e7cc22b0c22bc2f8bf0ca5255ec86

    SHA512

    75339ad715d850775defdc6bfab012bcb037bb00958d95f92a411709d7dc36fcbf8e6210056588ac4d8c375f93432147ba632fe2b70de64c1fc039b7fe3ff5f4

  • memory/2872-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2872-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB