Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:16

General

  • Target

    f822026ba390711dc432ab0876013de527e63183b857e09bcd6cefd6b137deccN.exe

  • Size

    75KB

  • MD5

    66b80f13f4fd251a7ebc9a76f812cdb0

  • SHA1

    ac8c5bf40ec15c17d77dbdb4bdb480c230243ff0

  • SHA256

    f822026ba390711dc432ab0876013de527e63183b857e09bcd6cefd6b137decc

  • SHA512

    14d65c9d3f5ac0e7c8b5359b8647662a436d921f732f1245a00d158b5254cf2d6b652f24398496ffc7bbe15268d7dc5b83049a7a7ab297d32a93f1ac2714b01b

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9ebZo6BT37CPKKdJJ1EX2:V7Zf/FAxTWoJJ7TYZogTW7JJ7TYZoR

Malware Config

Signatures

  • Renames multiple (3182) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f822026ba390711dc432ab0876013de527e63183b857e09bcd6cefd6b137deccN.exe
    "C:\Users\Admin\AppData\Local\Temp\f822026ba390711dc432ab0876013de527e63183b857e09bcd6cefd6b137deccN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2376

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

    Filesize

    75KB

    MD5

    01a7e664c7e5a19bcb89e3ea3bd8198e

    SHA1

    f33637d0d1f0152338179ca7796361107b225fd2

    SHA256

    175a4f14aadcb0854653d9a932197a2c5577b85bbeaff1e60633ede0a8af9526

    SHA512

    2335582c62cc3a762184e7cf9d0ed1c754d456698b1dfe7c4c597ca137660981b9968b231659545e1c8e2df5232ea21349229c1cfde347ab7e54325bea4568db

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    84KB

    MD5

    45012c1ddf41f58f00a3227b0896bbd6

    SHA1

    8bd1a173d2dd3b6b5b2e523ad49171daa24b5d13

    SHA256

    7d6a53c4e2372583e86bc95b987531ae13fbcb4fa336a5769efe788b28f1329b

    SHA512

    c5250f67fd4c2292ffa61e608dfd69c3239c2f5a39c393de14a2d3d54b6f65c9bcb7a9faccc7ac87ab37fa140f402de9c739da49db28c12750a5eb952732d241

  • memory/2376-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2376-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB