Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 12:44

General

  • Target

    f6b73935d5162b8e2165825e96a2040f2e848679167b8061354d8747ee05a4e1.exe

  • Size

    1.3MB

  • MD5

    5d274fbfaed201de674cdd70e70e7779

  • SHA1

    95dcb4ef57f0e9528a43cc3b8eae6e41447a0163

  • SHA256

    f6b73935d5162b8e2165825e96a2040f2e848679167b8061354d8747ee05a4e1

  • SHA512

    6f6209d625bf7497399eeaa1002aef680dcaa87db9b1b3ac2a9dde7118e24dad93e1611896b65d908004955d6f6721624d48ee918ccc1edef770367ed53bf1ac

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTBHfiPVi0HeopwaB1ssTmaNNT5IG6TKpfbUyY72XT82vaFe:fny1tEMirN4

Malware Config

Signatures

  • Renames multiple (395) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6b73935d5162b8e2165825e96a2040f2e848679167b8061354d8747ee05a4e1.exe
    "C:\Users\Admin\AppData\Local\Temp\f6b73935d5162b8e2165825e96a2040f2e848679167b8061354d8747ee05a4e1.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-312935884-697965778-3955649944-1000\desktop.ini.tmp

    Filesize

    1.3MB

    MD5

    268e3cd932626fa248592efaa9a8112a

    SHA1

    090b00ba7f750b73ef84f39ebd74eed8e59dd4ed

    SHA256

    13a004b98d4fe73f84141880f6e6755314f873bf0de8a58440199f12dc7da902

    SHA512

    98a5dc0c33909b7c1b1d93319cb9159e2610ea6b86559275357a5439dfa2ef20f9821d439899ad994c08087480acbb6bd9eb29b6b92be28394965f73457f63a5

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    1.3MB

    MD5

    d7a31fb77e5859e40f9b103160f8e4e2

    SHA1

    1e5fba3e968380f41f46e894b8195542467d2261

    SHA256

    fd10c298127a278594a800ec2fb785cf7e82d54ff156212c974cd0efb7272e85

    SHA512

    cb294319b12fe40c25723d603afd98de793575367c58c81878566c9606e6a330ae2c2357897f4e8de6459a5da4aa402b15b0023df693c23e1243bed32d8e9579

  • memory/1628-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1628-48-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB