Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 16:18

General

  • Target

    c84563325270cad48a25c2945a2156e0N.exe

  • Size

    81KB

  • MD5

    c84563325270cad48a25c2945a2156e0

  • SHA1

    373f03db819c4b0c47bf1d5e702f7417366fb085

  • SHA256

    2cb419b629dbab768641ac57b69b7fdcb5020c0e20620518c753d734309713ea

  • SHA512

    acb33627668438c4e06ead2e990b6e8da95d32eab1838a53cc716befac1c948cf24946760fede7de6351208d415adedc41ce6dc2f2da7837c2c9831a146a6668

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8IZR9TZi9TZ2:fnyiQSo7ZTZcZ2

Malware Config

Signatures

  • Renames multiple (2920) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c84563325270cad48a25c2945a2156e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\c84563325270cad48a25c2945a2156e0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    81KB

    MD5

    e4e8cec426fa7076b7939351182dae7b

    SHA1

    8644aad3e5c575b3207c74f67233f8671fde5bd6

    SHA256

    71b18bb0dd66ff759a2d2624e3ddcb1ef2aafc305da175c6161859e2d2982a2a

    SHA512

    1a589927733628473df805880d28cf0064b484d23d6fd5aa0730ac89abf036b137f5bd9000561e7189314abed43c784ae049368a06a38c3dea5f598d74b48a18

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    90KB

    MD5

    363ec81a79c6aadf41916bfc776d7ea4

    SHA1

    3ce7156e6d9780ba232c9607553c22f08217d0f1

    SHA256

    1c3f961ed25defc6bdcbcfa098ec0c967a9ee44a46bf302fa6f0ca2f72d2209d

    SHA512

    98449a4116196a7c33e3b38041db642ea245d30e9251654aeb7513bfda8d85b19134f79e4e31aace9cd94c6d583177f20a142b62a857a99ea78e9f58818e73f8

  • memory/2756-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2756-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB