Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 20:22

General

  • Target

    3c92a27f625c61223eefba83fd1db2bc9c93bec4d27e08b3debf43f94999fff9.exe

  • Size

    46KB

  • MD5

    4a4aba1915176fb134dd74f26177c0be

  • SHA1

    f284772179ee9965e6576798590d24af5a1c16f4

  • SHA256

    3c92a27f625c61223eefba83fd1db2bc9c93bec4d27e08b3debf43f94999fff9

  • SHA512

    88b52042ad0c207300b9789c003eed7711e4f257d710a3f38173bb489d03f9311ef5b211671c869c6a2b094302c0564da6f52093a531c092c531046d79159014

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcu90TKe+0TKeinMdY:CTWUnMdyGdy4AnAP4R

Malware Config

Signatures

  • Renames multiple (3759) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c92a27f625c61223eefba83fd1db2bc9c93bec4d27e08b3debf43f94999fff9.exe
    "C:\Users\Admin\AppData\Local\Temp\3c92a27f625c61223eefba83fd1db2bc9c93bec4d27e08b3debf43f94999fff9.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    46KB

    MD5

    03bbd62875d491a7b9bc3c4c57bc0946

    SHA1

    c4725024c25a24f6e4bdd7dd7395474d0ba6c057

    SHA256

    59b64ebf503582bd5ab185daaafcb1ffd28fb5c76fae8e04d0a8e4930c5aa15c

    SHA512

    93071aacebd5b654d66bcacc6cd95ee739eff6b8553ba93c867ea8bf82a8c8137274f76fbc04f9890f3a7ec61bec3ac03d442684334ba8bdd5e8a9b9309b02f6

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    55KB

    MD5

    b535c252cc7318912f14bb431aefaffc

    SHA1

    9ed7844daa927d4dd08fee6aced3f6c43cfc0494

    SHA256

    c0b0545ada23e92f4714e5c4ad91b8d5f36c9d169600e554ab1970fee93bab16

    SHA512

    fd036ebd3d2a763d79ba62152bad447c624da3b010bb310c2ac95f0821ebb2a14350eb13bc0c51603ecb1a58ee04cf7baf54645b0673fb692d701c9a4fbc3b86

  • memory/3024-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3024-71-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB