Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-09-2024 02:08

General

  • Target

    3bf04a762a2e4e43b56f4c19ba2792b0N.exe

  • Size

    69KB

  • MD5

    3bf04a762a2e4e43b56f4c19ba2792b0

  • SHA1

    b2edf4dfaa6c101c1d8200af2f5c4024481cd569

  • SHA256

    0733c794968f0115fcae0d5454ba09a6421db37037ca6ae8a5cdb4723b72c3d0

  • SHA512

    7458ae6030f5dd4597776a75d4411b056fd8cbcf212f958613d084061d10099ffcd175055e506635965520c53123ef2af4a4a58f04ed58009e0e4264e0546a91

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rB:V7Zf/FAxTWtnMdyGdyktvtU

Malware Config

Signatures

  • Renames multiple (3268) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3bf04a762a2e4e43b56f4c19ba2792b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\3bf04a762a2e4e43b56f4c19ba2792b0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3533259084-2542256011-65585152-1000\desktop.ini.tmp

    Filesize

    70KB

    MD5

    52bf6a8b1299e43aec4ade8d8fe94bd7

    SHA1

    a5631c442ff8939fb9a94742fed321be6fec92cb

    SHA256

    5757452048176a2aebd79092a3b3bda37127853ed022ecb8972395bec4e2f679

    SHA512

    0dac0ce10634b407476aba4a90abc2d46716042fe84c88bfdf15949ab63b2f455a65cfb2e4c6efc1387462b2909dc484dcb00ad1896c42012259e03be8c60d34

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    79KB

    MD5

    8da640521f6642a3f3e9f8d2d0554590

    SHA1

    063fa6d5a5b9237b1ccbc6c7ac64a9242c36bb69

    SHA256

    e3fcd4694c7ab110374c83c955ba0e93148f05a655109be62df5a4959475359b

    SHA512

    68711e11c2d5a8187076d75802463a26654b00905ecfb357e4f40bd02dbe19585858fbafe0c914ed2a15e91425262bad717131347b4a10def4a9900384d591b0

  • memory/2612-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2612-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB