Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 20:53

General

  • Target

    cc7c83203e1bb71a73bc16ecb54a7910N.exe

  • Size

    21KB

  • MD5

    cc7c83203e1bb71a73bc16ecb54a7910

  • SHA1

    e58e70de15061a8362174172eec7b6ae359a3707

  • SHA256

    411fc4854a5ebd3927c9ed5d6a30c855a3c41aa9b4fd408345034428eefb475f

  • SHA512

    899bad1a62aeabb7f8a68560d1ab0297877a8355fa17fa38fd40cae6cec88fd512cfc4814e8fc85dd5c99e56c4f8a237ff02bd86cd1403564047441f60cdc369

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJcbQbf1Oti1JGBQOOiQJhAT17en:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJ5

Malware Config

Signatures

  • Renames multiple (3400) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc7c83203e1bb71a73bc16ecb54a7910N.exe
    "C:\Users\Admin\AppData\Local\Temp\cc7c83203e1bb71a73bc16ecb54a7910N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2696

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

          Filesize

          21KB

          MD5

          a77db6e6e8311ec2450810eead70cbf4

          SHA1

          dcf182c3e52eea3fb8ea35f2757244be4962421f

          SHA256

          9e497da7eec99c6cdbac8edd0c7c5d0c712049bf3145ae36fccea413f0a1ef64

          SHA512

          22c80955e19c034bf6cb480fdd0d513ff7182635f7b7c1936f53cde5a51132890e61e973eb597ff2ef424a43caf4affd0f62d52be2949e0d434f70d216a39cce

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          30KB

          MD5

          2807877cb27db6d4f21ea600eaa31c1a

          SHA1

          79f428aeb2e2dbf1537c1c0dc332edbbd1409f0f

          SHA256

          e9ac039a60ea18a4ec0b80e8e18ae13a89a07e46eab196855c4958ddf28bfb94

          SHA512

          0fc346fdf2c36bc473308a9b53d5491f89821bb1ab62535ec072e854f87f447a41923a9a2c62001d2a48a41151b4a14b950cf366db2e8ba752361c61e7067db9

        • memory/2696-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2696-74-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB