Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 13:50

General

  • Target

    b05fe0f2dd97e5f9a905aea6d418b2ca5e8800cea2435f70e69e4eb8006369ffN.exe

  • Size

    38KB

  • MD5

    69f26e9d99efde4af0872226dc7481a0

  • SHA1

    2dac8a49cbc2d1972f3c6e181739d304fcfd1e70

  • SHA256

    b05fe0f2dd97e5f9a905aea6d418b2ca5e8800cea2435f70e69e4eb8006369ff

  • SHA512

    65aa1366392b2d7bcbddaaa9649581aa65ba18c4960b1e103e18af3b272b81b9a2746d75803b31564585ea6bd737cb8d10d719aba426df8ecb6d6559395f4fde

  • SSDEEP

    768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATBWvyBh85c54w/JYWJYZ:CTW7JJZENTBWv361JYWJYZ

Malware Config

Signatures

  • Renames multiple (3457) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b05fe0f2dd97e5f9a905aea6d418b2ca5e8800cea2435f70e69e4eb8006369ffN.exe
    "C:\Users\Admin\AppData\Local\Temp\b05fe0f2dd97e5f9a905aea6d418b2ca5e8800cea2435f70e69e4eb8006369ffN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3063565911-2056067323-3330884624-1000\desktop.ini.tmp

    Filesize

    38KB

    MD5

    525d0c4eb8ea0274246e70633b5c627d

    SHA1

    3581f10ac7e9942d6210446f88e295b778e962b3

    SHA256

    def4865ad3fee419dc0e30a4aab60ef6fe48163a3a7869e5c55ee4ca9ae7cdbe

    SHA512

    2f54d03a5847a8a4f523c8fca4f4673ca5860fadaf317e61366abce29046d3c988b6659d97a665be302f9b297dfc6dac1d601bdf4a30f8c9ff751a905750e88c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    47KB

    MD5

    8d2bc46c038627dd25a48c26d0a7abf3

    SHA1

    eb31a26a039c12938e1861d6d224e76c465c49b4

    SHA256

    6a08bb829b06bcdacc551e265d75a7093760bda1a95dd3688574e5ab826023fb

    SHA512

    7cb68ef96d89cb2f09b103a5d855da219c1c82e96c9934c98d6fb5994e2bc31f97edfe56a4935238714bb43caaee0e892e5759a7156ea221a60c2e847a5b5553

  • memory/2708-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2708-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB