Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 03:58

General

  • Target

    f27b2a0616181a63c2b3c4737ce1c26ddaa47fb061d75c253d7249ab2961195c.exe

  • Size

    74KB

  • MD5

    5a65934456a2c51ceb777930e3a9560f

  • SHA1

    61a027500cb1da73f38d44223e79633bbb7b1eb3

  • SHA256

    f27b2a0616181a63c2b3c4737ce1c26ddaa47fb061d75c253d7249ab2961195c

  • SHA512

    f8f2a472dd3a40366b1d19349c79b1ef05840c0c174d23a73f4669f222225bafec4f7ae88761586251eea68a978021ce27bda3dc7054d89bac031c27f9c7fcc4

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATBHfBo8o3PV15Rp:V7Zf/FAxTWoJJZENTBHfiP3zem9

Malware Config

Signatures

  • Renames multiple (2114) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f27b2a0616181a63c2b3c4737ce1c26ddaa47fb061d75c253d7249ab2961195c.exe
    "C:\Users\Admin\AppData\Local\Temp\f27b2a0616181a63c2b3c4737ce1c26ddaa47fb061d75c253d7249ab2961195c.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    75KB

    MD5

    2e5fb92f9bf8589cf3a503637946ee49

    SHA1

    c888cb072549aceaf30fc904530db84a20a5fced

    SHA256

    523cecd39e378b943e48968b9361244903fdde48366f0972862f4b34011a6df1

    SHA512

    47affb3fef393cbd74fa0c518992331a78fc742fed5f0136f9192aba25a5dc07be0462c50d1cf70c80d2c4409a99682054b303f6792a9046452fd40b75f5801c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    84KB

    MD5

    ea20baf68ddcb2cf6195f6d7a45f261b

    SHA1

    c619f10a472c1fac04a6ad1a4afd51b99bc8d7b3

    SHA256

    91c10217a51a2ebc17b32446b75e126f82c0652e39502fdefde473015da6baf8

    SHA512

    c67fb77eedaf1ba006e6ba0bb9c877f92b1b87ea6cbf8598711d836bd5945ee5b26fb32a12393dfa3c1ca4eb5030d595bda0a442b324e9e84929bd320c0f7cfd

  • memory/2324-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2324-50-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB