Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/09/2024, 05:47

General

  • Target

    3f0adef3fb28c8a7f6d36c708545f05501c93b866279b8e52ff6afd886bd9381N.exe

  • Size

    61KB

  • MD5

    87337807eab6f759ef4441f2774c04e0

  • SHA1

    b48daba0525d67c123f8f294bc9238a4f9998240

  • SHA256

    3f0adef3fb28c8a7f6d36c708545f05501c93b866279b8e52ff6afd886bd9381

  • SHA512

    76f5dd8d294643aa9a393774f803d2b063aab11f5acd0effcbf8540c8e4064bfc30f9c091cdd1b85bb6ef950558080405bc80ed50826356d69816d929caf3fc3

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATNyHF/MF/6m0m+Q:V7Zf/FAxTWoJJZENTNyl2Sm0mKg

Malware Config

Signatures

  • Renames multiple (3266) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f0adef3fb28c8a7f6d36c708545f05501c93b866279b8e52ff6afd886bd9381N.exe
    "C:\Users\Admin\AppData\Local\Temp\3f0adef3fb28c8a7f6d36c708545f05501c93b866279b8e52ff6afd886bd9381N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4177215427-74451935-3209572229-1000\desktop.ini.tmp

    Filesize

    62KB

    MD5

    289eaac60cabdcf55b7094a1efaf0149

    SHA1

    0b300333a57e448e22515973d89ad25311c951da

    SHA256

    460cf6fd34d4bd76e6acf13317d4ab7fa070ce8c4f0c030e6401410db0f9975a

    SHA512

    a9f53af29ad3dd962ad6263bf4ca1329123a0f22334e2d6c9940f7caa2cfe38f4dc4bfb4ce2b4ca049cfc54031b164077590a45cf75fb06983d012488172287a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    70KB

    MD5

    f02a52f7f40b5096d0f974ea2704c888

    SHA1

    cba278d4d5607d2954d7506152b0b8c1fcc002fe

    SHA256

    3e4ed6641f4b95d851aa7f30a0d290df3ae18b782f056c1d639d4e642ee81ada

    SHA512

    01c4ba6b077fafcb28f6eb16147f6d9a4ce0cc4cd5a8844a98f3bed82c528d32355aa7fa9107c06574d38309e576d3c020fa7d78d059934a8a9326749e84031d

  • memory/1984-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1984-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB