Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2024, 00:23

General

  • Target

    c21b9acdf630687cce7ab055cd876e70N.exe

  • Size

    128KB

  • MD5

    c21b9acdf630687cce7ab055cd876e70

  • SHA1

    d3079697639953ad7ee9992d5cf562cca5c76760

  • SHA256

    cd625d2e3bbedb86ac6e0ec4da41ea897b3c95ad6fc1263b2de8934c5aec125b

  • SHA512

    0ea59fdc5c388d24a42d510793391e29ba1dd5083eca9f1b24d512479b380b7277b5b34aa2e532ab38c44e02642a37efb2393e567bdb4923095e7fe1dbd4d77e

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxY5G9TWn1++PJHJXA/OsIZfzc3/Q8zn:fnyiQSox5G5QSox5+X

Malware Config

Signatures

  • Renames multiple (2854) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c21b9acdf630687cce7ab055cd876e70N.exe
    "C:\Users\Admin\AppData\Local\Temp\c21b9acdf630687cce7ab055cd876e70N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2352

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

          Filesize

          128KB

          MD5

          1682215eb8363397d930cbd1f32cf30e

          SHA1

          91eb38f6495cef5426abb496c081d11629ff7edd

          SHA256

          c28a7ae732263958be851939015a3b1042e26bd5a7619e379c5cd03ec57ade71

          SHA512

          2ff95a06ceac710175f478856ee162fcf0b6a53fbcd773ef97e9c183259e0ec5b3ddb6d351135f35754d0a91c056a9a3e89ef163701d883973d61610ae24c9ab

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          137KB

          MD5

          b625de5976e6be49b05e94352ea2a683

          SHA1

          429ae1e9974e956192e18df6f2b1ff4354a49766

          SHA256

          61f674373fa4e1486cdd5761fd93fa3d05e3ac14d8c7027c12917492a21ffae1

          SHA512

          340f36a6aafd4df2abccf849416a881d989fd828a46ac04ff7cbf96463b88d156980a245c923006bd6f2debfaef48f656c0e3b37b7d4a58d11731429cd0434c6

        • memory/2352-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2352-74-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB