Analysis

  • max time kernel
    120s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2024, 19:20

General

  • Target

    2f6ff05dc99e995db3bf320f1581928da195bf684903f6bd2a74c34b5769c6bdN.exe

  • Size

    69KB

  • MD5

    e85795612b1355cd49f2b91f53903090

  • SHA1

    9efeb947303cb8129b483c6b4f75fd8015edb717

  • SHA256

    2f6ff05dc99e995db3bf320f1581928da195bf684903f6bd2a74c34b5769c6bd

  • SHA512

    008bafd038c75b2ffda028a89b1287703a580036f6828e70b5dd42075009fc6a642c39f1c518e9c0e4a424607f29e857de4de9aa336f35161555cbfebcde223e

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8zxY5RPWG3PWGg:KQSox5S

Malware Config

Signatures

  • Renames multiple (329) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f6ff05dc99e995db3bf320f1581928da195bf684903f6bd2a74c34b5769c6bdN.exe
    "C:\Users\Admin\AppData\Local\Temp\2f6ff05dc99e995db3bf320f1581928da195bf684903f6bd2a74c34b5769c6bdN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-457978338-2990298471-2379561640-1000\desktop.ini.tmp

    Filesize

    69KB

    MD5

    43bc68815a56f4d1c060c6289c5e608c

    SHA1

    61d9d2842affbdeddd17fd6fafcb9473e1a5a735

    SHA256

    c9a85b094737d6f65cd84ee0725bf6b3574e0de96b52d449d1efebf64e08ed7e

    SHA512

    87c0c487096c59eb56802923c1b81bfb7c065fb781f9fb2169dc9b20ffaa886356b79cb4d86b638765b74ea402c3932c55cf3868d209a23f59f758bac2faf6c8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    78KB

    MD5

    5705bfa5d9ab0261cd9228bdbd3fff93

    SHA1

    446b238998336e0a9b6c547381856fccd7a46d99

    SHA256

    ed6293a272b16952db10338de1299455d4d02c8ba46e752c68ed459f07ecbfb5

    SHA512

    ab744aad7905358cccd15df2db79751cbb29c274cdba13ecfa8d7f1723b24a963fff9e3cbcced9a25aa5da32446b3d3da83267f21f67d6f1b16a3fa506876b23

  • memory/1348-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1348-24-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB