Analysis

  • max time kernel
    120s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2024, 08:14

General

  • Target

    bc65acb62595241f3024198d3486d960N.exe

  • Size

    70KB

  • MD5

    bc65acb62595241f3024198d3486d960

  • SHA1

    6ab397873adc55744092c1c4bc013ca83070456a

  • SHA256

    cb359f126085e6f05700192250d1d8dce65877a7f95fc1cf402fdd59f9d04ce5

  • SHA512

    2afd51359d7830660d52e54a6feac0b8ae827449e2bd8badf735ac638639a4212904c3b5a89c511249388008449fe5e7e5a3df8a6bbdc9638b79c421457033c8

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2re:V7Zf/FAxTWtnMdyGdyoIOI1Qq2

Malware Config

Signatures

  • Renames multiple (3351) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc65acb62595241f3024198d3486d960N.exe
    "C:\Users\Admin\AppData\Local\Temp\bc65acb62595241f3024198d3486d960N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

    Filesize

    70KB

    MD5

    b525ba6033d77ad6234a29195d4db781

    SHA1

    b3ca07dc6ea136064a7c8886ceb00dbde94ef69f

    SHA256

    7ea366e6deb3323ebe144a3b1fc60144d8cbefa03297e5460b9b5a7414e386ba

    SHA512

    23b6b541b8217eb58357d465fdea604f5d37580838f4cca2081d60f153031367ee746276ea2d679cf3ea4f20dbd8c5809d1b0b44dd724ed1378ac5ccc975c9b4

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    79KB

    MD5

    c519a21db348a9469fe60423c99efe7d

    SHA1

    8c3773d58f711b440452768f7311a1f02dd92e0b

    SHA256

    8b24531b1bb4bcaff713f86e3720f09a9dc75c9464f1245a0ba0a07d78dd1058

    SHA512

    3ea772cc9ab75ac5aea5f9928411761a3c0a87389f61ae0824ee904a29bd8a0947c031d7bd52d6747fa22c69aafca82f0840f5203d8e3a14674dd8724f5de624

  • memory/2680-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2680-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB