Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-09-2024 17:03

General

  • Target

    6ab3f25914eb00459927900e1f61c600N.exe

  • Size

    53KB

  • MD5

    6ab3f25914eb00459927900e1f61c600

  • SHA1

    bd39f8eb1378b033315641ba51338c5a434beb25

  • SHA256

    96380abd393b48c93eb4a66cbce116562159209c5e2b8db65a52a62895a18401

  • SHA512

    dd172978014305df8d1db06b89143893cca30cef1fb817682da5ee9c51fe1d0919ff091c033bcae12d251ce73725e2aaee5becd9eb92f95beb4347e98e584626

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcu90TKe+0TKeinMdR:CTWUnMdyGdyoIOImsKsy

Malware Config

Signatures

  • Renames multiple (3273) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ab3f25914eb00459927900e1f61c600N.exe
    "C:\Users\Admin\AppData\Local\Temp\6ab3f25914eb00459927900e1f61c600N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

    Filesize

    53KB

    MD5

    16c250af4a33f3f87c0ee33e0e3f79ee

    SHA1

    5ef1a14885c4993bd40dbeeefd4134b36a9f8e40

    SHA256

    8ed97118dbb32dba0c2a86a29b4f3b63362dccdab61a9086643f0c086505f184

    SHA512

    5d75a0e1e091c31438eb0d815f049f837dbbf572423cde2767b8acb2c89bba631c230998fa44ba6a034f532941d3f8dca9f1038bfb6fa7a0a6c0b0688ae93a78

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    62KB

    MD5

    299d905cd1af532bc67d7243490f5541

    SHA1

    3e118bdd53a99121976fcea9d3e95b89d33cc4c3

    SHA256

    3f69c36874af9c076e66aff1dad090f10a95ba320b485305153f15fac8391296

    SHA512

    ed9b093af52ba74e7dbbf8f29e9dd001aa2f914afe3c18c33bc2bb35aefeb75e236f9fd6d4ca0495f4d93aacc9a6489b7efb8c09759a5c17f3af46ca1dc2bbbb

  • memory/2616-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2616-70-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB