Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 06:35

General

  • Target

    f5a9a3822676501f339a39abacdfd970N.exe

  • Size

    37KB

  • MD5

    f5a9a3822676501f339a39abacdfd970

  • SHA1

    fb3f00b93719732167084ef0601d37bd2c0e8a75

  • SHA256

    5cabdaee88429a8f17428349ceb5f901a6912db015e816189a392bbdb0ee5ace

  • SHA512

    6da5da7023cdca5d46404dba84e8ceb53e0045f6eefd6303fc329154db7dbc63347b0cdc96bca5c4911f2e306c680ab88361ea38757b153762155814ffa04d32

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcwBcCBcw/tio/tih3y3uP9Py:CTW7JJ7TTQoQh3y3H

Malware Config

Signatures

  • Renames multiple (3316) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f5a9a3822676501f339a39abacdfd970N.exe
    "C:\Users\Admin\AppData\Local\Temp\f5a9a3822676501f339a39abacdfd970N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2672

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

          Filesize

          38KB

          MD5

          b3f5cb9440f46245ff98c6eb6c91fa1d

          SHA1

          72fc5d1cd0626c3ded63af24eafb76c543b6039b

          SHA256

          d3afb5d5a9e9101103ff4685677c3d805ea744ef876c4954bbef4f5932ce5579

          SHA512

          6f2b2090273c8b0d90587a2262199aef2891579366c36e052b0edfaa4ae5cbf7d074e1f981557466e1bdc6ac5c0cb56c010b08745c4d9b233e5646121d85a816

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          46KB

          MD5

          27f1e5aeb55381bed7cec0f1d85fa01e

          SHA1

          2bcf559a173c84639c9d9d0524a6632fd4250381

          SHA256

          460375c5d6c0a44f07a7d87d044996c95e05713ac79ade467e654219bc3f4c86

          SHA512

          5af14ca1c328f729744cb33eeb393b12127d34f893d58b5ba90b655a487a791257d66a73be813459686c7b3c49b8d2be5d2472b4232478fb124e7e026b8654f5

        • memory/2672-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2672-72-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB