Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    06-08-2024 02:21

General

  • Target

    c4b615647ae4973fbf1edc0dbfb1bd44e430f05cefeb0ac4ff0a5e957d8c12ec.exe

  • Size

    57KB

  • MD5

    61475ca5ae69257dddb452bc5053a459

  • SHA1

    e8e8a980f9c548ffa60fc6172cbbec511c8daeb1

  • SHA256

    c4b615647ae4973fbf1edc0dbfb1bd44e430f05cefeb0ac4ff0a5e957d8c12ec

  • SHA512

    c93bc7068487e7472cee35c4642ff48fc15283452203839156f13065cdd1947b6cfb57ef0e2dd3ca830d4795a9d48c7e27b7839bac647f1dbf30d1a1a55d9e40

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATNydWK9WKvhmkX:V7Zf/FAxTWoJJZENTNyoKIKQkX

Malware Config

Signatures

  • Renames multiple (3740) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c4b615647ae4973fbf1edc0dbfb1bd44e430f05cefeb0ac4ff0a5e957d8c12ec.exe
    "C:\Users\Admin\AppData\Local\Temp\c4b615647ae4973fbf1edc0dbfb1bd44e430f05cefeb0ac4ff0a5e957d8c12ec.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    57KB

    MD5

    b38832608fb709986416e0a3e250dbc2

    SHA1

    dbfb4cb481ee575205f6a1b83fca8fc1e8763d78

    SHA256

    8b6cfe80b71738162a368074a0daf241e4a915816fa4bce58f1af48204e4cde6

    SHA512

    811bcf67ca2e3db18ff81e9798e51099e9f84477d47aacfacd4737d331538426970c13a385dff56c1318e8ec3647f9571a3129974b0e6373f194590543f2f7d6

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    66KB

    MD5

    c0a9b049d9926165f9280008a7d6c03c

    SHA1

    a30c26c2821f44656c89d01febee54a1f59bb863

    SHA256

    87e53cb962b526ff0020d34c09d9e97839be8868e0b9bcf3a024a10cbbcc24da

    SHA512

    9401f7cd4d3a2d93f057ce2fb32e7ec322049fdcfb890c01ff00a6aaf1f21731afd0cdfb35a68ebae194c9c73f6a6d59bbfd439cbb53c31e5400866540798281

  • memory/1708-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1708-658-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB