Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    01-09-2024 05:40

General

  • Target

    fd41602bd01f6bed493340c183206e2ce0aac7647343a36d5dc00191539ec5a5.exe

  • Size

    81KB

  • MD5

    430bcdac37ab641700795a179cc63a0b

  • SHA1

    6dcd396c4a8bf9f9705493167b1a9c6cc1329d53

  • SHA256

    fd41602bd01f6bed493340c183206e2ce0aac7647343a36d5dc00191539ec5a5

  • SHA512

    44646704b1b16c669ce7e32826f7ba4c11e4c725f1e73014fd787f24803d2399b6f515412303f6ade7482544df17c080ea9a2533e43c1356ad1e413a73fe6a8d

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8IZT+StuSts52/:KQSo7Za+u+s52/

Malware Config

Signatures

  • Renames multiple (3487) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd41602bd01f6bed493340c183206e2ce0aac7647343a36d5dc00191539ec5a5.exe
    "C:\Users\Admin\AppData\Local\Temp\fd41602bd01f6bed493340c183206e2ce0aac7647343a36d5dc00191539ec5a5.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

    Filesize

    81KB

    MD5

    ff934dfc1b97e49a95447305ea33324c

    SHA1

    234712420b8e2b968b88123f29152864ac9817a0

    SHA256

    0c302360f53e2e975cc92f0661b388b8dadd621ebfdb6da70d11e89b6c2472e2

    SHA512

    26b1a4b11bedc6ae3b4752bcdc2fc1d94c6f8340a6881b392b893f93a9fe292cfb04b00e334f03cdd913d29a4e72ceaac2834fbdcc6f45bfcfc1de75c2353472

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    90KB

    MD5

    494af5bd6b90520761cd4a41e708593d

    SHA1

    206d0f030586d6161bf0aaf2459630f4d32900c7

    SHA256

    977dfd641b174ee957d018ae790c5d163272c06d3272a4deb1e0676416c1a0c6

    SHA512

    1b978e9ebea400a8d2d91b365bf0be47babf7783614e8d9c65c317762502cc29faf91d56be848fbc81ba1aee66c46022b5a11bce48bd67f91c36df16aa6ef90a

  • memory/2480-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2480-69-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB