Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 01:38

General

  • Target

    bf26fa9be9ad6eae46e98ce1cf843700N.exe

  • Size

    60KB

  • MD5

    bf26fa9be9ad6eae46e98ce1cf843700

  • SHA1

    b7abad38eaf850e7d819e69160ada0bd24191907

  • SHA256

    677e82f5dd03a81182bd3031e777f51a6fc2132595c17c6bfa0edff532902339

  • SHA512

    88cc58fdb0f719ca0e26c8bab2943b506b20be7eb7f45561ea4ce32d9787ad13d7d22b9ecc6cbcb932b96290ce712cea6355ee2557346cd7207b9f9e6e285b13

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8IZTkb/bz:KQSo7Zgr3

Malware Config

Signatures

  • Renames multiple (3166) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bf26fa9be9ad6eae46e98ce1cf843700N.exe
    "C:\Users\Admin\AppData\Local\Temp\bf26fa9be9ad6eae46e98ce1cf843700N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1476

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    60KB

    MD5

    ea55b7e8278f101e6cd0f9f53ca4f451

    SHA1

    263df6f514cc86398678a6200399cca2d4c27b7d

    SHA256

    68193bab316a6d2913829482abe4f9d71c79238f966aa9ae9d6cf438b882c05e

    SHA512

    a2c974567e13444463b0f6f513de93ada8b1c61d096167f136d4b3b83f8ab019214782bdb691cf59ab9182fc663d5ff9449aeb770a2b41b34591279bd58be5d3

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    69KB

    MD5

    d47e922f2adcf14d4a830e45293ca02c

    SHA1

    3f32404a946d44c344b264ab978303a2dfaa0ea8

    SHA256

    79664e6d7447638efc4f1aaf7501e1ef0dfe34986188408479a34237dd5a8b46

    SHA512

    76ddb563a3be0c6b4e4851568128d6689a5869980cb86cd6094accb2c8c2616fd784e8ce6ab81c864db3369014ebdef7592e7baf65541441b1b0418c34174f21

  • memory/1476-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1476-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB