Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 05:30

General

  • Target

    dbc2a83a50ea464fce7f2dca2079b3d0N.exe

  • Size

    84KB

  • MD5

    dbc2a83a50ea464fce7f2dca2079b3d0

  • SHA1

    1898e083d9437a9bfbb5bcec4538322818ddee3e

  • SHA256

    c9472e450531dd659ed36167d9cc3993e836dd2f6bdf42e730ddceefbb57fc0c

  • SHA512

    9bf7410184e5a6623903ce89b71ce445b35dbc3c90943fa02bb1980f244183ef87c753cf435e0a552afb88adde3dc6644110595eafdacd8ea2d127a1867843db

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTNyoKIKMvTW7JJZENTNyoKIKM0:fny1tE5KIK/tE5KIKr

Malware Config

Signatures

  • Renames multiple (3118) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\dbc2a83a50ea464fce7f2dca2079b3d0N.exe
    "C:\Users\Admin\AppData\Local\Temp\dbc2a83a50ea464fce7f2dca2079b3d0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1196

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

          Filesize

          84KB

          MD5

          d9c28bd8a85f5ff41d1a235ae64bee76

          SHA1

          c143e3898741a5df5c3728a61aeb88eee280fb0d

          SHA256

          419d7e34e0f4606323e1d46696a12eb2ef61fd70f41698c3e441ee975cf08cb5

          SHA512

          3b1fc9e00dd1144613d26aa0dc7875f3ad2b4de8c59409210dfa7318481b9158e3d4e93daecc667053f5c434f29c4953a4ae4c74b419a71ab766101b1bd0e6d2

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          93KB

          MD5

          347ba28820be9a99bb121e93fc8d2bd4

          SHA1

          83bd39f47c372f0a9d498809356407eeff165a94

          SHA256

          38193d4d2462b73de8b4412a0b73a4de331516904eb2e560c2371c284bb12b81

          SHA512

          4c270141ff7ea6ae0df855d66819ab22fec088d2a30ab37ed6875ebf609693f545b0767830ad3d71ad51735ba5d76b0ba955b11f51e53b75a3244fc91c65df4a

        • memory/1196-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1196-74-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB