Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    05-09-2024 12:20

General

  • Target

    fbb84ceb67bff40bbd47b1dfe1e211a0N.exe

  • Size

    27KB

  • MD5

    fbb84ceb67bff40bbd47b1dfe1e211a0

  • SHA1

    23c006da0e9773436d17b49b30816995cec5011f

  • SHA256

    30b358c3abaf8a757285d02cd523afdc31ab3eac8bb82917c51b3b35b5637a39

  • SHA512

    ab4fcc89ceed7a1488fa9b983648351627b545c6cbafa62067e13f6db10dfc45efe0bba9c7a0f168e3ebed710df8fcff100399c8cf28e807009f1392bb867b9b

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9HSXM2MN:CTW7JJ7T1Ss

Malware Config

Signatures

  • Renames multiple (3416) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fbb84ceb67bff40bbd47b1dfe1e211a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\fbb84ceb67bff40bbd47b1dfe1e211a0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    28KB

    MD5

    b23abab592db723aeb19859ac7e26a56

    SHA1

    964245150ca773cf50c9d8597b015e873ed3cb71

    SHA256

    5289cd41fdfc3438410c1cf254b6dc715637f6a07983cfb494e6449ff5241f9d

    SHA512

    c9b8452a996bdd5ab24739b87de430db871119c1819eb4691e87545b8d2d5648f0c2d9787aff62081ebbab20d3e4bb363a4c613479312b6e7209fbb1cd2686db

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    37KB

    MD5

    d97d1d05a542c6d5d6167b5445b841b9

    SHA1

    8a60daa70e4446c9e780f736372356730bbf15c5

    SHA256

    3c4bc59d197c20a63c7d0a9d2a49ca870245c5266d19b162bdb738891a02c17c

    SHA512

    6ec9a5c140c38a76dfb2d5ec16a2fa3d52165ba98424d58de2ca88232902119adb342f87484895d6bb02d14ace46d103ea3d4d0796278377a2f3612e1c542eb0

  • memory/2960-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2960-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB