Analysis

  • max time kernel
    119s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    24-08-2024 08:03

General

  • Target

    2bcc309410de908bc20a5fbbe78aac00N.exe

  • Size

    21KB

  • MD5

    2bcc309410de908bc20a5fbbe78aac00

  • SHA1

    e62c33e369a80e4926c4c9bc45e120446192fa32

  • SHA256

    f3a876c8eda5d37f9c53551659631410cde4de9871c9677e0d5fa06d4bafa194

  • SHA512

    5deb09780500e9231b06a39e2d016b438c28f73c3c8c53beea504a894394d64415cd28772dd0181cc566b3204dd6ae94f215e1b9c8ea8be059bc403e673d5101

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJcbQbf1Oti1JGBQOOiQJhAT17FoUdOiJfoUdOiJGNk:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJq

Malware Config

Signatures

  • Renames multiple (516) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2bcc309410de908bc20a5fbbe78aac00N.exe
    "C:\Users\Admin\AppData\Local\Temp\2bcc309410de908bc20a5fbbe78aac00N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

    Filesize

    21KB

    MD5

    8a8626dc618b6377b9f0613c86cd6440

    SHA1

    b25f732b0b1e5f3a3e8fa4685d89a8ec583991d9

    SHA256

    bb4b9043dbd5c6bf99ee5fafa0ffb9592707c60deccd7243b97c2dd9c2abff0c

    SHA512

    a031f418161f448e5da011c3f671f67e75b9b43ff0a6df73e6ac3877cb70a9379ffc4aafaca47eeb69de8fa74599a8a231979c5196363ed705628d60ef10188a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    30KB

    MD5

    e1284408dd2f8ce92ea02d930dbc8c61

    SHA1

    cae23847298c615a73671b46fe0c97f5e88b1613

    SHA256

    f203afa690e53159c8f8f19d52ab543bf0a82009d2da6651443949b92d52a12b

    SHA512

    04f149c45ba5ed1d6e3b222d37cb304390a9b032184d018eff2c3c4382634e151f524ed55f3bddc6ff5b1eda255836c15d1561ca6721d2f159933b6d17e9f445

  • memory/2172-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2172-27-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB