Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 09:35

General

  • Target

    b866faa9561f7998747fcf29ece8b460N.exe

  • Size

    52KB

  • MD5

    b866faa9561f7998747fcf29ece8b460

  • SHA1

    198fcdc7b39714c536f9e514e40a0ed9bbbff047

  • SHA256

    d4148be294c2552b0426aa3cd98d7877655a0804fee0ad7949064b06ead8090e

  • SHA512

    9fe5d6695fae9ed4c72d66f8ae425fea8a330cfb787475f132567baec807efdf44e43104b2e631d8dd576666437fbd289cb0d3427b31d9d1d5477fab1c32260b

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9HSXM2M8TazTaB:V7Zf/FAxTWoJJ7T1SjTITk

Malware Config

Signatures

  • Renames multiple (3319) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b866faa9561f7998747fcf29ece8b460N.exe
    "C:\Users\Admin\AppData\Local\Temp\b866faa9561f7998747fcf29ece8b460N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2296

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    53KB

    MD5

    583fea23404a10acb427994cbdc1ef20

    SHA1

    1de6cf0907d94e84b850eace7814e157463bfde8

    SHA256

    4214b1d6c5c356c019d0715ac8a0262379759541ea91675c1bfc0b4868845fd3

    SHA512

    122722f29bfb0f87d8cb24690907cef9f4023b257ea9ba1865be1467756b25e97716e568ec1de452ed0b58714d28825c8f9d8c78ce13eaca1e6b0ae63bc895c6

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    62KB

    MD5

    7e5523de48c5f707bdd94ac20ed9be0a

    SHA1

    f8e5ebccd0c83c21be9866c560002ea0117d64c7

    SHA256

    bbe2d19f2b3646a9f04bb2ce7f6456aca2390d5c3a7404ba5b77395acf7cc198

    SHA512

    c53e7c0a10cb738c28a2fa5b499b1d70034c8e5a4edb177c8906243bd4c349de7fd87aa028cf4b22afd88f99056dbe8668a1aff8b1c6a631486fb2834eacb7fc

  • memory/2296-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2296-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB