Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    01/08/2024, 21:31

General

  • Target

    05c3bedf59c3fb4a50340aeb26840110N.exe

  • Size

    75KB

  • MD5

    05c3bedf59c3fb4a50340aeb26840110

  • SHA1

    183744554de825d76ffd924b4105356bae2c02c7

  • SHA256

    3f774f46734ea1d7de3323e440fb12ecc47849eb45ffb20566bcabb21ed98f28

  • SHA512

    6e92ff60adb4eac41637ee2ad2a25c422912734a7d316ee3c5a32b58fd71e8ae5613f226e5765ae462624d8fe618e22200f41508f9e03a15403ff6b819937a2e

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTNyoKIKen7bCCF4LRoE0oc9ztoLTfZD:fny1tE5KIKenxE07oF

Malware Config

Signatures

  • Renames multiple (3192) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\05c3bedf59c3fb4a50340aeb26840110N.exe
    "C:\Users\Admin\AppData\Local\Temp\05c3bedf59c3fb4a50340aeb26840110N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2592

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

          Filesize

          75KB

          MD5

          b08c741280f6201df878bf70cb6891b1

          SHA1

          4a47c0852f367e9aa76ad495fe36878a3f791a14

          SHA256

          a99935838afaa786cba9f8fce1b78ea37ea5e1487ec92e0511042f7917210349

          SHA512

          41ef8f9350250913d5ddf2d7ee69031b41f2f9bd4aecc18ecc067fc3fae473ca5d1fed7022c80cba4599c12273718fb58e71eededfb16481290076cd45072fa5

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          84KB

          MD5

          805c618b75e1917924be633906098fe1

          SHA1

          1fc54f146340d9331f032195128d428278a7a7bd

          SHA256

          44cb7e87abc5bd90be2b984d7aaa05aeb3bcb74c7ddc8a910b4473db4e839c70

          SHA512

          2779046998aeed5d6af32a9b05896d165daffd26e523ede113a708f8cb920c689739fc3e52ad16e3bb34dad1fe0842f52f4d8cf8b19cbc0ed473767fc08148b2

        • memory/2592-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2592-666-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB