Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 05:23

General

  • Target

    b6170edbccbc35b12491157d1ab050e0N.exe

  • Size

    43KB

  • MD5

    b6170edbccbc35b12491157d1ab050e0

  • SHA1

    1dc14d2c6751eb9ae3eb8cbb4f13f4f535d3eb3a

  • SHA256

    39f64ab230fcf7e3a766e76c7eca808e9976efa2fa0f943efc97f9cddcecd054

  • SHA512

    e1d5e3a501e80a8cd9bc05dc9641363984e0d834ca7ff4b9af48bbc68e83828261c3ed9d71c38ff092d2b53c6200d684ea602c90da974b3d2620d93ad45b3983

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXB5X:V7Zf/FAxTWoJJMX

Malware Config

Signatures

  • Renames multiple (3434) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b6170edbccbc35b12491157d1ab050e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\b6170edbccbc35b12491157d1ab050e0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2872745919-2748461613-2989606286-1000\desktop.ini.tmp

    Filesize

    44KB

    MD5

    0f2e9babadfd012e1b669747dbc127e7

    SHA1

    f49970909db81fdc0b698f956f03457a611b8d6f

    SHA256

    404500b6bc118b30779a099736162f4b61dbf635463abdf87a860120473c05df

    SHA512

    9ea573ed7c9ddb2b50b194e0d21eccfe8c805474a515dbe3191c906ffd507127a78d3b3e1dd3bbf2634856894d2b4eebb026884d7f75236b2cbb55e49f2f8f28

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    53KB

    MD5

    504c0ab696b6514c42086ea040aa3444

    SHA1

    fd25a28a565d19ff34a7eca76c6a8a5ac60db892

    SHA256

    c152a03e450937d53f97396c87f57e91c8020a51c2b20fc0f8957b7eede015f2

    SHA512

    932aec7dce2c2e272e8a67f729aafc9f6b5663774dfeff3d6954a19249474fe6249e28bc9a91a7cbff3cadf94a80a2af311ac475ec5ee946fafe00289a3610a1

  • memory/2548-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2548-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB