Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 03:24

General

  • Target

    f3b3bf364dd68899bc5ead5dfd2c211d347d129c0eb1f806f14ddf17aa38718a.exe

  • Size

    41KB

  • MD5

    20d49eb6d359108f567e0bed3a0b1a70

  • SHA1

    4f3d3744b1bca7e78639b2a49a52dfbeafe337a4

  • SHA256

    f3b3bf364dd68899bc5ead5dfd2c211d347d129c0eb1f806f14ddf17aa38718a

  • SHA512

    451e6cd50f0e3b19cf5a0bacbc258f83611d4d691f57aae344064d756003a736fbbc7c17e26b901183133a29c793039f0b1f37a2eecf3cc7f1ce5d6c641d179f

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcu90TKe+0TKeIiKxy:CTWJGpG8nIx

Malware Config

Signatures

  • Renames multiple (3825) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f3b3bf364dd68899bc5ead5dfd2c211d347d129c0eb1f806f14ddf17aa38718a.exe
    "C:\Users\Admin\AppData\Local\Temp\f3b3bf364dd68899bc5ead5dfd2c211d347d129c0eb1f806f14ddf17aa38718a.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    42KB

    MD5

    514a370fe8d3c4903b6c7aeb1e00ebf9

    SHA1

    915000b896badc85bb4b318d7f5468c0efa2145d

    SHA256

    7e541a225575f3295071ab69d0d161535d53d97285a7000ec135840fb139ee73

    SHA512

    7c4cc84c357a1e273bb83e845a879c8567296b47813657126930be028fb9369d9b737ca345a368bd83ba2e48645bdcc7239cf717cddee1dbbf94f9abba9d154f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    51KB

    MD5

    54932430dc194244ed63ef67843d9a22

    SHA1

    8594a6b490e1b94bde986d2e95708049b8db59f1

    SHA256

    07588ec3f8574151af9bba462925beff5b983a6298a01e31b9facdf196ca6d50

    SHA512

    267ed79b3856ed8e76f8cd6a64a4906294965f5dc8a04b53c635399f2ed7e53919638ccde564ebf71c99aecaaa1f9ffbe04165ca5ae87267fe3bd6ab6be45872

  • memory/2064-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2064-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB