Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    16/08/2024, 23:20

General

  • Target

    c59f75352d97c0ccd6518a6f603f8500N.exe

  • Size

    24KB

  • MD5

    c59f75352d97c0ccd6518a6f603f8500

  • SHA1

    91ea1abfcac3c76d597925337867469323558450

  • SHA256

    489b0b912c25c4216eb7db4931100c250f49eece3991f076a6d10b1da86cf48d

  • SHA512

    a495ce505ea806a06fb311dcddd992b01a4da3b2f47ad09b772eefd48886c4a945fef789b3bbba15cae354536dd08bb2c59793a91bfa2aa5b0455070a1cc2b8b

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJ1Evd5BvhzaM9mSIEvd5BvhzaM9mSsxmMxm9+9W55:kBT37CPKKdJJ1EXBwzEXBwdcMcI9W55

Malware Config

Signatures

  • Renames multiple (3446) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c59f75352d97c0ccd6518a6f603f8500N.exe
    "C:\Users\Admin\AppData\Local\Temp\c59f75352d97c0ccd6518a6f603f8500N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2660

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

          Filesize

          24KB

          MD5

          0e3cf2cdb6e1717b27339aa3ffcd4175

          SHA1

          c08664f1778318423ea36f0567ed4f26654f6770

          SHA256

          801d931dd56bb1c69f128fd746fc5e057d93c4412fb196940dddba376b7aca9f

          SHA512

          4a5cd6954c36351073948b7199b0bc9751013085e03d10797d425a0c90b935d4c98fd7cbece5d2623861dc3d406781483bee6c230d1a5db565962a74e2f6fba3

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          33KB

          MD5

          1d863bfd53475de2b895ce6cd6bdd6f5

          SHA1

          1589951e0f80f5d875f53146134db0c1ee2ffae5

          SHA256

          d41804bc3e601df62859541b7f33ae77912fba90526ff3a0cd5fe634926e2e0d

          SHA512

          2a17ff7f0439ab5edbcaa4fbf7b2cfe1c2c818d9d269a067d42224d1bb832df17115c6368b98fd02f2ba904f9adb057e6b39a07ac27bc1b482dc4d63fd09e66e

        • memory/2660-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2660-75-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB