Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 02:53

General

  • Target

    f6ad2c4e66965c804af0466678c26d38408394a19a0f249d97ab776c7c9adad5N.exe

  • Size

    1.1MB

  • MD5

    bd0dde1efb674791be13ea27154ddff0

  • SHA1

    aac6069df2462a7e95eb9a45227e4fe69b219a1d

  • SHA256

    f6ad2c4e66965c804af0466678c26d38408394a19a0f249d97ab776c7c9adad5

  • SHA512

    f99052428ad87ee5c6f28a819e6b235e376032bd8bd0f0a4a6f9b2d6b1fa17333f706dc417fdb195e8a93d48d499960d68c9dfd5916203bf7511104cf799db1f

  • SSDEEP

    6144:KE2Ni/HiiHiiziiobiio4zaqzamzaIzanCme5CmejCmeZCmeR:ViiHiizii+iioFe5FejFeZFeR

Malware Config

Signatures

  • Renames multiple (452) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6ad2c4e66965c804af0466678c26d38408394a19a0f249d97ab776c7c9adad5N.exe
    "C:\Users\Admin\AppData\Local\Temp\f6ad2c4e66965c804af0466678c26d38408394a19a0f249d97ab776c7c9adad5N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:264

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini.tmp

    Filesize

    1.1MB

    MD5

    5a3a1ffcb4bc424675e6c023e0ba9c4d

    SHA1

    02b4d9c916a94860bc5d5d42df9908693b63d78e

    SHA256

    7d327a2f42692ca3554fa23e328bc2f7b947c48b36ad704f7d871e6a974d5f98

    SHA512

    4cca1d79d912a91a1e6669ffe6317f22228d257578c3b7574cc555de49ff87a10300d24f0e6b593f5dec2bf711ddc67695fb834e3b5ccd128b2b9ef6425ac9e8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    1.1MB

    MD5

    cdeb0fb7fd96b1dd365798f8fae47488

    SHA1

    c09ffd96de5c51414ceff0f795c596cf70f3cd6f

    SHA256

    b23ddf0757b996d05dedf6cdb1a280aaae2262e8e0d1677aeb56e02636f089c9

    SHA512

    8906d6cb3be0cb4b39ec1882dd744fe6bbc7de3ba2c72f64bc36382c6e77015fa73f46477af575d243555b8a2e816cf826cb827634f3fb333a90f30d8c8b18b2

  • memory/264-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/264-62-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB