Analysis

  • max time kernel
    150s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 02:13

General

  • Target

    bf9c238fe177bd76a920272033a075f7878d837a004ce656edb9c899989eec4c.exe

  • Size

    47KB

  • MD5

    bb13250644f32c9d40ee745f9af3f3c4

  • SHA1

    d1a254ab21db18093098e63cc0baa38036c8731a

  • SHA256

    bf9c238fe177bd76a920272033a075f7878d837a004ce656edb9c899989eec4c

  • SHA512

    40cf2f24b11367ec06de32a0aa3224a54b2e22ea36ac4ac9fb5bd68b8346577e82cb6987755a474b24e1e18a9448622d3eb7aa12c1e898fc3136a5b0ad4b03a4

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcu90TKe+0TKeinMdg:CTWUnMdyGdyoIOIX

Malware Config

Signatures

  • Renames multiple (3773) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bf9c238fe177bd76a920272033a075f7878d837a004ce656edb9c899989eec4c.exe
    "C:\Users\Admin\AppData\Local\Temp\bf9c238fe177bd76a920272033a075f7878d837a004ce656edb9c899989eec4c.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2128

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    47KB

    MD5

    ebc90063ffef5ece118bdc1718e28939

    SHA1

    64ce8b2f9b3d84ef9c50bf7ddbaaf87d540f5361

    SHA256

    c8f05b3b5db76037a6a8947c334faab44934c067a400f0fc164e988890704d82

    SHA512

    8f9ae7f47756bd54168f9677cb305cd3ed29383834a57956a1b04e69adee4a7a82697a0aec517a4ae13cac9a482d43507b3f6a0a313350ec9bd9e5936cbfd235

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    56KB

    MD5

    d1ced60dff4c330ef7438b9091c17f65

    SHA1

    17ff4a5a0a3d9efc2770cdbb61207bb64872efbb

    SHA256

    4acf1313862ba1a3d1f8132e6428358674770f1646635ce5ab470c9f15c81eee

    SHA512

    bdfb6fad1ec2a9705b2dee4c6ad094431ccaad439e0448f0f8ecce43e6e23437b6427f0de138f04f57fcf3a26dd11561e1159fb8f89ee8a6295205500a4ea186

  • memory/2128-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2128-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB