Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    02-09-2024 00:40

General

  • Target

    f9dfe0b894771904152facf6c52a7cf0N.exe

  • Size

    41KB

  • MD5

    f9dfe0b894771904152facf6c52a7cf0

  • SHA1

    b15832b5f04b19247e181a72397f6eca9eb05221

  • SHA256

    9aef7eff088b139001370936946b357e94ec0d325b6355f5532fddecf5ddc354

  • SHA512

    e3d06b48ed8ef29ce8b88595f4329785226772d5aab9f00350bc3e680ac4072d3953d7ac37e970ce488336570b39e80f039feafafab34bbffa0ff0bdb3a3cc28

  • SSDEEP

    768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATBWvyBh85c54wEqfqE:CTW7JJZENTBWv36xCE

Malware Config

Signatures

  • Renames multiple (3419) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9dfe0b894771904152facf6c52a7cf0N.exe
    "C:\Users\Admin\AppData\Local\Temp\f9dfe0b894771904152facf6c52a7cf0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    41KB

    MD5

    0f4776d370091fe7a33c59fd4f515ff1

    SHA1

    d6945fb517338b537693fe0984f04ba9fb346159

    SHA256

    3bdcc844fe337500dba0dd96a00203f324f4ec267377b93abbce76f610ab5a04

    SHA512

    07161f9bdf8a06d7f8879eaa375b8fed6d739ef94411011fa06a7ff54fdc961bba4406dc2a50be7bab96e613c6b99f57186218883be0f00e1e9694b27e67c27c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    50KB

    MD5

    402ae5f93b5c17a0afbb40a16a901457

    SHA1

    a9ae1079eadb96781ca7512e144a043252e9ba68

    SHA256

    6e6143b4909852aae8e6e68cea06de5ac01e249d70f7d7cb19111c05d8a6eb9f

    SHA512

    2e6c8f31c93df5cb16b366380b18a05e27f221098d26babb911735ddad323b07ea6acef15c63bb1a2a33e4edd27672dbbf3a55ea7c4cd7e4c6050a0d6eb9de01

  • memory/3056-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3056-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB