Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04-10-2024 09:14

General

  • Target

    f7295fe51db22db2f4b8ea8f575e0a5d258494fd275dfa15f6265a8fe35a4cccN.exe

  • Size

    58KB

  • MD5

    fde751d4870de1b8ed8ef231d53746e0

  • SHA1

    36d9e1c5171afe50d5818ec01157470ee72a9175

  • SHA256

    f7295fe51db22db2f4b8ea8f575e0a5d258494fd275dfa15f6265a8fe35a4ccc

  • SHA512

    579df03f73c85eafce3c11bfb9b312bcea5120fbcc1c31e1204200c9d8777482155560cd9304b39cca1cba39e622ad7889e8192b9f9252b2005edd7f11462ce6

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFIb:CTWn1++PJHJXA/OsIZfzc3/Q8IZTN

Malware Config

Signatures

  • Renames multiple (3315) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7295fe51db22db2f4b8ea8f575e0a5d258494fd275dfa15f6265a8fe35a4cccN.exe
    "C:\Users\Admin\AppData\Local\Temp\f7295fe51db22db2f4b8ea8f575e0a5d258494fd275dfa15f6265a8fe35a4cccN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1846800975-3917212583-2893086201-1000\desktop.ini.tmp

    Filesize

    59KB

    MD5

    43effc62b52d02eb885bedb88a3dc282

    SHA1

    54958e79481ca390024319baade6a8f90b1a0107

    SHA256

    d4457d35305b560149a627cf8f7d16295224342daf54c7ffa8f15db1e98313cc

    SHA512

    b74973d6d02cac222c01eb9c702995adb07fdf261362b4ca365714109cf92492420e19a29c86bdc35e10aa151db33e25d55dcc17ef5a7ed3fd1e3048bdeba515

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    68KB

    MD5

    7f9511f55d3162b4199320ca3239d327

    SHA1

    458a8a07fc1d6928e8cb8385bec130eb1973684d

    SHA256

    014c9190e8c0785d6ad7c1f1c4fd44b21c34068506251dcecc2595b12efc5c60

    SHA512

    147cff0b8ad26f18dc136a48aed959a625661bd09093dfea74fbf4bb01eb9bc70486514de1a58ed3d8aa7887f7a33eb37c1ac949f140e776d59693e3d96a16f0

  • memory/1940-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1940-72-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB