Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13-09-2024 23:34

General

  • Target

    b1fd238e2eec0ac2ee506ac8020a1950N.exe

  • Size

    55KB

  • MD5

    b1fd238e2eec0ac2ee506ac8020a1950

  • SHA1

    03e59fade495dcb54e28a1e7373790d96e555f00

  • SHA256

    caca2c4325695562abbdc7a18b3722ff08bb226ae7598687f43c0f57c19f1062

  • SHA512

    41cfe1c6b9c7c9f6e07cd60da57ca583523ac7c6540f0964213ec1d85171dc4f4bccf7e7bb77b841d795419b194a7c9f7275fa9e87c0b82f4f2726bdc4b3b8a4

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATBApwp133EskmK0:V7Zf/FAxTWoJJZENTBAOIfmKJfmKO

Malware Config

Signatures

  • Renames multiple (3156) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b1fd238e2eec0ac2ee506ac8020a1950N.exe
    "C:\Users\Admin\AppData\Local\Temp\b1fd238e2eec0ac2ee506ac8020a1950N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini.tmp

    Filesize

    56KB

    MD5

    4afb8e32deb334da19279212719871e1

    SHA1

    4167d224de10342b1b392aebdb67cf5c2f2279db

    SHA256

    e48b378ceec5c9b128a0e337ed64f51bcc6dd2730543d03352059abf5417ea61

    SHA512

    d4c67c46e2de221d138aa179232c8d143d4d6b572209d842f45d451dfb94e38816faa4d2de601cc780e5e0d3363a08e735b4c0fa5edc41fc9e17f8203d6d93fd

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    64KB

    MD5

    0a1ac7fbd312761813a341a3aa50f5d7

    SHA1

    d3ed808edca7d06f79f480bf620a1434582cef67

    SHA256

    3eb1c78a2745cd44f73400d62c0954a7fcc1c9b8661ebe25360638d5f331d37c

    SHA512

    dfefbfbe573ae18bd21b33992bc1b5755eb9bdec9f798f55eab53168a8611487eb08c8c3645eb84558db374d70e0749c38cd7e41ef51c8e53a1006848afb31ef

  • memory/2372-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2372-68-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB