Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 05:53

General

  • Target

    fbd7f255ee403fdeae1f3607b05076bc1c82a790bcd864b6fa57020a80f82933N.exe

  • Size

    59KB

  • MD5

    433333e13d19e6c7e8ae5f8a4f572340

  • SHA1

    8d2de0295e1bcefa88529b7962eda6722af92dda

  • SHA256

    fbd7f255ee403fdeae1f3607b05076bc1c82a790bcd864b6fa57020a80f82933

  • SHA512

    51cb4cba0b915970f0bc6958a4b1280f08f30a1a7e18a4bc6595d8d9441d75897e5db4d51a1b86d2b15e1e317d14076d5a8c97d111aab760ddd476d18d5fb5b3

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJTU3U2lRtJfO5mdGwmdGC6E:V7Zf/FAxTWoJJTU3UytJfO5mdGwmdG0

Malware Config

Signatures

  • Renames multiple (3095) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fbd7f255ee403fdeae1f3607b05076bc1c82a790bcd864b6fa57020a80f82933N.exe
    "C:\Users\Admin\AppData\Local\Temp\fbd7f255ee403fdeae1f3607b05076bc1c82a790bcd864b6fa57020a80f82933N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    59KB

    MD5

    ecfe3d7464d83961f502e6c0f83034a4

    SHA1

    5e411039317dfc537a68b3980377a432b59d9319

    SHA256

    5ce75c642d9c035eb13db3fdbae5e67b49ec056d98d18999837a6cf19ec9a5af

    SHA512

    20d608a0b8dbb5b884ede0b71bad9de2a4bd81288192ccf63030c04824533db3df44b8e26a17fcb1c7a60137dd2f31e915fb5e01eff5d0c24775cb570fce0f4e

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    68KB

    MD5

    c03a884ee6148b0c6b338f99dc1fd19e

    SHA1

    0e437028c60d68d32d617ab825ed196c67afb533

    SHA256

    090eead39bbcfe192912ced135c781b3046e12074e855322768d9f73c5462bcb

    SHA512

    d126f6b21f0b5f62466e2728db80fe307e02cf02acfc1403fa8e5f67934b4c5e407b8b4275dac779acd6163fcc415de97708c63c436c804744845c41e9f09fc9

  • memory/2900-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2900-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB