Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-09-2024 06:17

General

  • Target

    f03cbb95f11885ffd1254051c2dc3620N.exe

  • Size

    65KB

  • MD5

    f03cbb95f11885ffd1254051c2dc3620

  • SHA1

    12848c346c241b79de6234d99d6e8e71b2a8c597

  • SHA256

    3335340e6dd5536edd033eb5f6ef8c68f3790e751ff4fb18e5db3f173fa3eeba

  • SHA512

    ea1a976d6fdcd388080bba526f2d7cf0f75b6a91db4c21e398eb94db15b5a9c08a8dd4f90294c3bdcaec96699faf0ff75c61f69173f37d53d4077502a1df7431

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcwBcCBcw/tio/ti4c6kjkw:V7Zf/FAxTWoJJ7TTQoQ4c6kjkw

Malware Config

Signatures

  • Renames multiple (3302) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f03cbb95f11885ffd1254051c2dc3620N.exe
    "C:\Users\Admin\AppData\Local\Temp\f03cbb95f11885ffd1254051c2dc3620N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1846800975-3917212583-2893086201-1000\desktop.ini.tmp

    Filesize

    65KB

    MD5

    d38b2864066f73695d495ac3401b1364

    SHA1

    a5a8b513936d472948ab4e0c54d2055e8e9feca1

    SHA256

    c5b25cd6a07f3263b9ac0c989ea0e1d250bf093b5e1b9e11207e28ec74e7ff7d

    SHA512

    01f191714630cbc95e974df81378d4875437ef78895689b269100576bdb9121ae0cd13e96c594f123e146a9ec45707dfc3ca1ce56fb61e8ff1caae7e683f649e

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    74KB

    MD5

    421bf0cc02fc817b0ac2457ed4c03138

    SHA1

    db1def7ee656202490ad76c4f31678655bade82d

    SHA256

    6cf707ccfe97cf01b25038d9d1f4d1a59a791e985791a6e6e6453099ff86b3b8

    SHA512

    94b417d9e68cf7b7d54504ca62177c9ab0069c06fd82b659ae33ba0193a65f759dbfba16cdeb4a174057eddb89ffc18af1e3c5d8e3cf12c58fa239894d16dbb5

  • memory/2956-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2956-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB