Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04-09-2024 02:35

General

  • Target

    3f13b07ca0dfb106945e51c6d4d80a50N.exe

  • Size

    65KB

  • MD5

    3f13b07ca0dfb106945e51c6d4d80a50

  • SHA1

    ff9fa288fd3e3e64bd4dfaeaeea073a8b9efa17c

  • SHA256

    6310afeb10243f67d2a82cec0baa4b35420598b0cf9a6c80d28a0fa0499253f0

  • SHA512

    3a1c1bc9b78f54ce08b6cf0e81c1300e64a5e028782941d4b9f5e1f5f63aa6fc1fa02a3a3cb8e330bf9e77455370921d55d032aa80de8d656cab338e287807b8

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFzk:CTWn1++PJHJXA/OsIZfzc3/Q8zxY5Z3t

Malware Config

Signatures

  • Renames multiple (3305) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f13b07ca0dfb106945e51c6d4d80a50N.exe
    "C:\Users\Admin\AppData\Local\Temp\3f13b07ca0dfb106945e51c6d4d80a50N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

    Filesize

    66KB

    MD5

    1686c51862dc6672aa0ddd357bc27c2b

    SHA1

    511186414555262959e7421c26abccf91b54a092

    SHA256

    ef0bac754c5b310826e35829cc5f193d43cfd0ae506760cbbbf570f69ec0bdb1

    SHA512

    151a0743412c6018c4bf13659a44cea1ced38083bef65464c6bf59b95d6e053beb4b188d5ce250f29cbb735cc54606c56572341dbe3a5c6f37feedd064917c50

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    74KB

    MD5

    ae6bd22ea36008a16c748ef6db20054d

    SHA1

    4ce14f943d0063703c0332c17a889f3f153dba53

    SHA256

    9302db4da6a3637cc1fd66951d219332866bdd3bb0fdadd74e3740ae1bf5eb66

    SHA512

    49da3b5bf059cedf280e9ae06bf9c40a200824f8d07d2f1ecb8f444b9b10a1d7dc470006fa28a7ecf38bca9603a12b304d2d69e22b4fe6fba4843233425dce68

  • memory/1732-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1732-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB