Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09-09-2024 04:47

General

  • Target

    fb92cd33504b88c0f1fe46be1f295656fa25d4e9a2d6f044f8360369f1f2c76c.exe

  • Size

    57KB

  • MD5

    3861436ed46aeae59b2591352d585d7a

  • SHA1

    d76cd52cb8de1f1902277ed08af6812c70ff861f

  • SHA256

    fb92cd33504b88c0f1fe46be1f295656fa25d4e9a2d6f044f8360369f1f2c76c

  • SHA512

    7c026f90111c7d6fa488001072014b54f8f40449f1717be2cc34ae1e26303fe04c3cbd4744216b606778b441f3d57c93955641fe71f7752e83db06c81165ddb9

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9GRtfxligi1xrligi1xp:V7Zf/FAxTWoJJ7TofxAHXAHd

Malware Config

Signatures

  • Renames multiple (3791) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb92cd33504b88c0f1fe46be1f295656fa25d4e9a2d6f044f8360369f1f2c76c.exe
    "C:\Users\Admin\AppData\Local\Temp\fb92cd33504b88c0f1fe46be1f295656fa25d4e9a2d6f044f8360369f1f2c76c.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2872745919-2748461613-2989606286-1000\desktop.ini.tmp

    Filesize

    57KB

    MD5

    6098ece96c55c205ce85638ca5801728

    SHA1

    f753dadf78a072bc2b08e2bfa988803decfb2763

    SHA256

    8418eb16700ba1a4890ff83f1330fe73673fb5b2bec89aa1e2ed24077e9f28f9

    SHA512

    fb7203006c5853698d461dd9cf09e7a783e2a1586ee52e66fbc2d98f9229f781816b207976618e43029f1e99fbb6c1f12ba07293515f7e5f2a4bccc111b5581a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    66KB

    MD5

    045750f160e2bd8f923a86ccd409d80d

    SHA1

    61d29018816a719d4c219b0c953220f3d17f03aa

    SHA256

    b9b066da9b96cc34bf79c25baed0bfb9c9386fcdf3c93bba14e328993bb19cdb

    SHA512

    4dfc726ef76eba9819208c91836412586385c27881dd62dc1a161434e507fe107ff215c5488c7576fcb3a73ff58a65ee8617529c33d29a91509854d11d22b4da

  • memory/1552-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1552-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB