Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02/09/2024, 05:59

General

  • Target

    f5db36cef3cc8011f594e5da0789389e6dfd8cb07de75faac356c5631d865af9.exe

  • Size

    100KB

  • MD5

    2894b74c431a90283937f69fd1dc90c4

  • SHA1

    de175f6c4982b964db03f1056a75b252bdf793eb

  • SHA256

    f5db36cef3cc8011f594e5da0789389e6dfd8cb07de75faac356c5631d865af9

  • SHA512

    2a8f1d210495c1c76e4f24cfb074d0940713bfa64f0da9b0e05d98214d627f0ac50fd1ab7c6ba1d293d80e35ce60ba0fbae372447e3066a5b860d5bebaf29a5e

  • SSDEEP

    1536:V7Zf/FAxTWoJJ7TTQoQIRUTW7JJ7TTQoQIRh:fny1oRIR7oRIRh

Malware Config

Signatures

  • Renames multiple (3434) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f5db36cef3cc8011f594e5da0789389e6dfd8cb07de75faac356c5631d865af9.exe
    "C:\Users\Admin\AppData\Local\Temp\f5db36cef3cc8011f594e5da0789389e6dfd8cb07de75faac356c5631d865af9.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    100KB

    MD5

    9a4a30086886fb61b93ed6dd1f72a53b

    SHA1

    28a32c7ecb30d8999e182c46beec8abaadf43056

    SHA256

    ffc0327306989324d10b5bfdb3da3c1fe5625d94fa64ad2b374e17d3bd11e571

    SHA512

    18744b9c25e47ddff0d8a3dd2e24fa08f2959bc9e84d1d3799619dd73fc52454b93139b2844d9b5481a558a8001f7b8eec54beb41ffd091fb30092e4583e8fa2

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    109KB

    MD5

    f5d2b8324da11d86c7ce6fec7c314723

    SHA1

    c40e789d74462257396814af9fc7b8839158f9fb

    SHA256

    6c3f534c1040b5b760fb9d25cfb89462b557d9f986f27d35b9f36e0074864f59

    SHA512

    c9efacd269a7fc208bb4a37fb4d708444ad7e097bd7b464f3e55a5cc70a9ca60544f4af2c732239d221cd15b1efff58f7550856661d4e150df83590dd949657e

  • memory/3044-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3044-72-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB