Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/09/2024, 12:10

General

  • Target

    f3fa399f7b5b2162a2d34d58d2145ae0N.exe

  • Size

    108KB

  • MD5

    f3fa399f7b5b2162a2d34d58d2145ae0

  • SHA1

    d395a2c17924556c51de0f89f78aa84fe0fa163b

  • SHA256

    0762d3a568bc053e4caa36bb9bd3c0e06564301083fb18a92b03d36fa57f89d7

  • SHA512

    d020a621317984904f6c3b2cfeeb478cb5de4bfb294eb41a52e9360f0270343a579333a5f8072795b6512fd4f23fc8c6dce7dfe3eaec271bea46544572d732d6

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zx4LgLqS2ENVC0161:fnyiQSoFcWOPC01c

Malware Config

Signatures

  • Renames multiple (2842) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f3fa399f7b5b2162a2d34d58d2145ae0N.exe
    "C:\Users\Admin\AppData\Local\Temp\f3fa399f7b5b2162a2d34d58d2145ae0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:276

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3063565911-2056067323-3330884624-1000\desktop.ini.tmp

          Filesize

          108KB

          MD5

          dee09dde2c4c4c6f54c19bb233251591

          SHA1

          cdcef9fba6d83530e836ae12e04175e428adff26

          SHA256

          d01ed202ad78f292060d19cd3ceb4179cd5fc7e94f99f01f89c8f25806e97645

          SHA512

          a48cdac05be1b3d8bac8b7cf51c6b46eb622bbca84faa3490c62756d9ee5952d60bd15a8dbaee7c5575ab54a8a47529be03f137c067c433ef2eab68c321cd3f3

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          117KB

          MD5

          8ba11e009205c526df037418f908c32a

          SHA1

          c6a5ef4d63d09241aad45c9c0897d5ed72047575

          SHA256

          bc27d5f3ad95780b3c4a6151e364ad73902dac985ed63348d9ea52ed8b1c6de3

          SHA512

          f83e2e3047586ad8425d102712a4e8ebe088cc39d2aace89072e5e69547ce9718454fc5d357b82b156f0e37ffba848217c423bdc686dc06f71ee7f8bd10fd821

        • memory/276-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/276-70-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB