Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:18

General

  • Target

    6fdeecbe4a703ae8c9ba0187ffebd7a55ade89cca8d5c251d845ac32900dec2bN.exe

  • Size

    25KB

  • MD5

    b046c2b0869b17d855062e0a6f0392a0

  • SHA1

    bef96b677c2dc0a25099e074a9af7a3a44c336fc

  • SHA256

    6fdeecbe4a703ae8c9ba0187ffebd7a55ade89cca8d5c251d845ac32900dec2b

  • SHA512

    df819ccf578f77eba244c11dfc2c924915f8564bfccc4918ac172902cbd04de9fbd42ef3cfe38c5edcc21856bc0b032372d81333be291551d584e3d827668cd6

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJ1Evd5BvhzaM9mSIEvd5BvhzaM9mSsxmMxm9+9T6u77:kBT37CPKKdJJ1EXBwzEXBwdcMcI9p77

Malware Config

Signatures

  • Renames multiple (3450) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6fdeecbe4a703ae8c9ba0187ffebd7a55ade89cca8d5c251d845ac32900dec2bN.exe
    "C:\Users\Admin\AppData\Local\Temp\6fdeecbe4a703ae8c9ba0187ffebd7a55ade89cca8d5c251d845ac32900dec2bN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    25KB

    MD5

    42777a4a6036277fc093c04b62b463d8

    SHA1

    0e141bf5f4b133480d7365054828fde36308d1e6

    SHA256

    01e8a2b97dda58e377af861fe9534d1fe8d3f7da25c9e9e6f20e30672f88b051

    SHA512

    66f6fa11dd8b4ca6e5f3085b555c3641103b6595a4f6edda16c02ce6ce2a0322ca9911cfb767470aa537285b3b209e5f2f31bbc2f60aa35b0b293f5d999ed237

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    34KB

    MD5

    2e8391d171f93546e295dc6b76a73f49

    SHA1

    7f1de3d217d6b35254012d891c1e1d7469962e37

    SHA256

    a0ebda9a36d27b3c254e8727f655877f8140969f696d1f5ab4fec1e144fdc438

    SHA512

    e6a63f9bd3fd7972186c8b566b2d976999b7723a1a649e94ba1310a69df375d13c91eafaa1d9ff090e29ab59962f7f01c7fd9e6863543f473b1c10730f71dd64

  • memory/2684-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2684-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB