Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15-10-2024 04:50

General

  • Target

    f6963b62f236e16a6d1bf9daaa7537211bb1d062b1c224f166035c5e422758c6N.exe

  • Size

    28KB

  • MD5

    7e4923772386700691a222b732df5e40

  • SHA1

    62d00ee039f29ea20a9e5071c2257f6f0897dce1

  • SHA256

    f6963b62f236e16a6d1bf9daaa7537211bb1d062b1c224f166035c5e422758c6

  • SHA512

    b3532b972fe03deea9babe80bcac5cfb03dd45ffca8cfc634f97c13c9f81225b648b469d246b76132e525f95c118f88cc5b15af46892936692f05ea8bc1e699e

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9Y9ChuAhue:CTW7JJ7TxMAMe

Malware Config

Signatures

  • Renames multiple (3329) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6963b62f236e16a6d1bf9daaa7537211bb1d062b1c224f166035c5e422758c6N.exe
    "C:\Users\Admin\AppData\Local\Temp\f6963b62f236e16a6d1bf9daaa7537211bb1d062b1c224f166035c5e422758c6N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4177215427-74451935-3209572229-1000\desktop.ini.tmp

    Filesize

    29KB

    MD5

    fbad23a1a2907533d5ad6e8cebe04433

    SHA1

    aa38487518e73f19cf15eaef971f6ef4ff6d6c08

    SHA256

    bcbbf192747e6f0d8a582f3f375f4877ecde23990909fcf6cb9a40fc7f170fa5

    SHA512

    d7792d88a36502c9af14ce0ff8b1af305a836c09f86d388f32140ff817b99af93a96ac6a002fafd221d66e69716cac2b4b2730d33ff740418240aa01f954bf7d

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    37KB

    MD5

    3f6e2b2e27d448af2da4edb89c23e564

    SHA1

    a36dde50df355f77b644085b22f9e6bc0af26799

    SHA256

    c05064cc117f4f4655fd414b1c6affddcbb89e8260699742afe7fe5ea398514f

    SHA512

    52dc0fab2bb631df1c47655c2dee5b87880b6451b086ffa0c1d0e263ce20fd0fac1448b1f2dbe906bfc07345dd0153ddf4d707f3514c9b463bc15ead42516ae5

  • memory/2516-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2516-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB