Analysis

  • max time kernel
    149s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    27-07-2024 03:30

General

  • Target

    c55ccabd0a183e61f9e0817f37e50f1e5137616e875e3cb1de2ab2ec341224c2.exe

  • Size

    48KB

  • MD5

    1f821d445b6f9271a6bac33b4992b19a

  • SHA1

    e81852b73d532a103dcfb9e6610e19e141ad8574

  • SHA256

    c55ccabd0a183e61f9e0817f37e50f1e5137616e875e3cb1de2ab2ec341224c2

  • SHA512

    3f5fa0f39ab3fd33bbd5d4c4f5b32d1dace6f175a21e7e11834d136b7fde91d87499b235033789b62c5dfd42dfcd3e8a879c3e8507d6f1a2edec2a5c861599bb

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcuX9km9k/fxRfxyko:CTW8OmO/fxRfxykK3ZUkK3ZKYw

Malware Config

Signatures

  • Renames multiple (1750) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c55ccabd0a183e61f9e0817f37e50f1e5137616e875e3cb1de2ab2ec341224c2.exe
    "C:\Users\Admin\AppData\Local\Temp\c55ccabd0a183e61f9e0817f37e50f1e5137616e875e3cb1de2ab2ec341224c2.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2172136094-3310281978-782691160-1000\desktop.ini.tmp

    Filesize

    49KB

    MD5

    04d317c9c48cdc135b16202f813d86fd

    SHA1

    c77559884866fee5e749626f99c6f8b119214787

    SHA256

    152166761775e17435cd1db5a13a66711061b7588b272e551fcf6fff5aab3f79

    SHA512

    5dbfc94def6b7a63302a90fcd492425842e257e42e9f0da5297ba13bc0814c5b273db00d628ef862d95c159a644e5ff8dcdb3a53ecbb8d8688dd9b81f959fe67

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    58KB

    MD5

    c7774c202eb1321415db4b6959c384a4

    SHA1

    56444a0b608d8a4130461c171db2c005f1e7b724

    SHA256

    53d1eae60778aafdd004125ce96377bfc863c2b097d00aa776fcbe17b0e1f2e4

    SHA512

    e365542890e83794dc87d95f2fcd7a24aa138ff033bc17899f7e5f37a9c682ca1b18a11574496a6edde2d8a9f1bf7fadcf2692162a2e61c1398c0d581a4c1a02

  • memory/2508-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2508-36-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB