Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    06/08/2024, 02:29

General

  • Target

    c859ed686ceba160401b929a10d071e272a78ca76a9bcd815ecc6cc7bdafe5e8.exe

  • Size

    43KB

  • MD5

    3cf4fa3ef40560a9a4dc168f3db7ba2d

  • SHA1

    ce5f4e9e2ced8ac45c3d997b725a428079fba170

  • SHA256

    c859ed686ceba160401b929a10d071e272a78ca76a9bcd815ecc6cc7bdafe5e8

  • SHA512

    c9a67dd758e022ddea788509a56378b388e876b2016beaa593e35be25b2f1bf4bd1ebe277840a999df814af6efb5f93419b8ad34666e9a84218dd351a50f16a6

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATBp:V7Zf/FAxTWoJJZENTBp

Malware Config

Signatures

  • Renames multiple (3770) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c859ed686ceba160401b929a10d071e272a78ca76a9bcd815ecc6cc7bdafe5e8.exe
    "C:\Users\Admin\AppData\Local\Temp\c859ed686ceba160401b929a10d071e272a78ca76a9bcd815ecc6cc7bdafe5e8.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2224

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini.tmp

    Filesize

    44KB

    MD5

    38106353616f4d85b08625a3d93c8387

    SHA1

    80da7605b62a7b3f9b120ed6698c7b5c13895568

    SHA256

    4308b184af07d56d612e5d59f8356c51a18509070a03daddfce5838367125999

    SHA512

    6e09566579927b5b929579f9b653de4a8e5065777c83d1b807201b9c57fdbbb53cc1744fef76dbb125a9beb176b459fcd641a1e262b4f69aff76c9fea8bec840

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    52KB

    MD5

    a34a7ac2414303ed8d917a176f290d11

    SHA1

    311882c9790450cdea6bc190df1cb7e242b077f1

    SHA256

    f62a30e8f359c41779837c8f2134ffc39dfeff399515d71f2ba3079055d69beb

    SHA512

    38442755bf9684164208ddb4ee989d1c8b272ff54b545f9f3aeb9e8e996ad0086ec23558ff38100e403a44d63cfb59b16256d64fb236934891e43585603ba361

  • memory/2224-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2224-660-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB