Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-09-2024 03:32

General

  • Target

    fcab53db9dc36cebb2f81779cc31d4d8129f315dcf3a759a5be78ff2f481ad96.exe

  • Size

    32KB

  • MD5

    85650ddeb9ea74326493987fd25e3822

  • SHA1

    f40a37a072a3dc05c7fde9afcc1ae3cf81dc9c61

  • SHA256

    fcab53db9dc36cebb2f81779cc31d4d8129f315dcf3a759a5be78ff2f481ad96

  • SHA512

    a03c8324bec348061ceeb2ee784dbeef93b4d56401a27ed34f0da6ce4e9e8f040a62676c5eb4370d236e4839d8c0a67988ab808af822903d9a272ea25dc0328a

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcu90TKe+0TKec:CTW6

Malware Config

Signatures

  • Renames multiple (3775) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fcab53db9dc36cebb2f81779cc31d4d8129f315dcf3a759a5be78ff2f481ad96.exe
    "C:\Users\Admin\AppData\Local\Temp\fcab53db9dc36cebb2f81779cc31d4d8129f315dcf3a759a5be78ff2f481ad96.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3533259084-2542256011-65585152-1000\desktop.ini.tmp

    Filesize

    32KB

    MD5

    72c6bd729367ed9fbf15931082d3af5e

    SHA1

    23d132095a9c331fe921d37aaa5ae8d29ac41129

    SHA256

    595c3510472832fc8bd3de896730546ac72114b28557f55f2213a193e1752885

    SHA512

    fe5933d8f602f64d2bf06e048c51ad7455997eba491b6ee71caf5c8d1990d7739302b896dd405ed35339729ab513f7a3fdcb61002a3e03a15684d2ecc967bca3

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    41KB

    MD5

    c2e91e6ad5e16e2bfb1c7011793a9e7d

    SHA1

    0708fb791dbf29feafb1d1ca4e493f59be29f990

    SHA256

    fb16656fde239114abd11a806615fa5647aac0e059011c0ba196677fb57550a4

    SHA512

    cee04e17372a7e9f5a2df92cd0679becb62bc83153792c75763c4285ef8913a4e83e6039cfb4e2c290d1e90cc6c2cdde01b69f0e9ee69a5abd9c4f0537dc821a

  • memory/2516-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2516-70-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB