Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 05:59

General

  • Target

    f6a9fd0c0298ac82c32bb05ae71494b26486a6b3d9ae23b36644602c659cc59cN.exe

  • Size

    47KB

  • MD5

    dd9cd7f680851a4bbbc5b5e884cf1130

  • SHA1

    a1d7e1ddd89f4bee26a5f2fb8b3614246d7144da

  • SHA256

    f6a9fd0c0298ac82c32bb05ae71494b26486a6b3d9ae23b36644602c659cc59c

  • SHA512

    b69642af83f249765c5f73c67f6f752d4dada14f2572065e822a9d964439493e2428011fbbd1c9be18779b23f611f46d2e5efd03140f4a0d0cecd62de812ff30

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9pJzjJzX:V7Zf/FAxTWoJJ7TXJzjJzX

Malware Config

Signatures

  • Renames multiple (3172) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6a9fd0c0298ac82c32bb05ae71494b26486a6b3d9ae23b36644602c659cc59cN.exe
    "C:\Users\Admin\AppData\Local\Temp\f6a9fd0c0298ac82c32bb05ae71494b26486a6b3d9ae23b36644602c659cc59cN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2396

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    47KB

    MD5

    5295e7bae053351b351013b9e4971458

    SHA1

    4c0ae11548685f953ffb3498d90157a05e3e936b

    SHA256

    6694fa513de3fe2a9af94297ae2c01d1204827e5813f24e8d2430f7e15740c09

    SHA512

    4a36c3dad45c0a211b82436a53764ed4506d4f54a15cda5c635fb9241ee28d49d825c25b193dcd978b0d4e4ef505ca5bea97af83512055c42a3b6fc858f483eb

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    56KB

    MD5

    72dfd8929454ec95ae5be283dc0b4b49

    SHA1

    fb7db826eceeaf05750ab36b0ea3c40dc606f7f9

    SHA256

    5afc5452aabe8f876bdd52005f055c78ebffed7245b0032a902ecefde7aa7a58

    SHA512

    2fe7a475c7515e5eab14f526973ed51f50f2c52733d38bb1e20b5bbf0c96aed15eb9a5071530ea1f37cac2595f6a5b59a7043f6fceb4e84e81c1b2822fd121e4

  • memory/2396-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2396-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB