Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    03/08/2024, 02:38

General

  • Target

    c233a61539d0fd8c3c4903ec50003d9ec03162840a43a7f5da78e61082360f8a.exe

  • Size

    37KB

  • MD5

    e016d0704365f75ffa74413b2b08f2f8

  • SHA1

    52a3ed175c254e05bb2edcc596ba2476cfe7b3d7

  • SHA256

    c233a61539d0fd8c3c4903ec50003d9ec03162840a43a7f5da78e61082360f8a

  • SHA512

    fe3ac902de7133650e5577da8b7af3c982c03421c62687cd065e06383b12dce456eb7eed622c6bbb7fafaaac1240efcc49183912c6ebd2a1e83bee05bd628373

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcu90TKe+0TKeinMdd:CTWUnMdyGdylT6

Malware Config

Signatures

  • Renames multiple (3832) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c233a61539d0fd8c3c4903ec50003d9ec03162840a43a7f5da78e61082360f8a.exe
    "C:\Users\Admin\AppData\Local\Temp\c233a61539d0fd8c3c4903ec50003d9ec03162840a43a7f5da78e61082360f8a.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2136

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

    Filesize

    37KB

    MD5

    3cacb151bcc0b91b6ef7f06521cc301b

    SHA1

    9c4bbf41b87de5b17af32bd043f8db4d7f3ad3c6

    SHA256

    d6c0e14abe1701b2c51cb4291db56afe5f7ee199792cea293e7f3c4689f03170

    SHA512

    341e9507058b0624f2028d016514d06b570a09d7dd778f1d3e1c28dd803fde702b8965fd43111fab20dafef89d92d588c1eecc706b60e59803110aad5e747076

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    46KB

    MD5

    dafbd0d0f42d575b6fa96c67a268dd2b

    SHA1

    20a0750bb3ac39dfafd6a2e93f43b6c14690ceff

    SHA256

    730e5d828bb78b20ed75fdac8d83a9af464f0e9cdacfda239c1cc7bf6582d33f

    SHA512

    954d066a1737b31d8024e65bd13a0e9a0ae1a5b8f62f6fafb71f0c90d39ab26092c11c6691a26f5b3e3e3442b465b0cf1ea5b305a3b00394690fd4668472499d

  • memory/2136-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2136-76-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB