Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25-08-2024 11:42

General

  • Target

    3cb7543bf304a29d9861e19deebd91d0N.exe

  • Size

    68KB

  • MD5

    3cb7543bf304a29d9861e19deebd91d0

  • SHA1

    5c8f4228aea429e4fb022bc39d75b2593e10c051

  • SHA256

    df4ca57a2a96d17344e402825c1c787935608be43d5f1abc5b57520878167277

  • SHA512

    c9f81bafb23a6c59e59759a789561696960d55577a3420b293d300302660cc4e988f41343907d5f5c49b62545a851ae42a4ff13031a8438b729fd37341c30da8

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJBZBZaOAOIB3jM2jMO/7OSbo5+Oi6Jfo5+Oit:V7Zf/FAxTWoJJB7LD2I2IbSq+6

Malware Config

Signatures

  • Renames multiple (3261) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3cb7543bf304a29d9861e19deebd91d0N.exe
    "C:\Users\Admin\AppData\Local\Temp\3cb7543bf304a29d9861e19deebd91d0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini.tmp

    Filesize

    69KB

    MD5

    82511da9e15e32d3c01eeb10c5beb06f

    SHA1

    e0a62d57716da100a35e1dbac0299e83fe95b2ce

    SHA256

    3141010f5b9c3f061c4ffe5e16f0d79156619424da6c5e0e6e008f1e9451594d

    SHA512

    ec1163e2427baa18f44ecc91ceed0ce89d313df3cd0727a7a8c82135bd503cda25f072ace5b522715f2c36036fa68a6e9928cd2e4876167120ea70dc56b2e7e5

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    78KB

    MD5

    bdc4340ea7ff921b2b47585428f503bf

    SHA1

    e2d024181067202b3c62dc535859acd931e49614

    SHA256

    b99a0ff534db578697111a06a1af2f2faad36fed87735a188ad154c298b7753e

    SHA512

    395ee406d383960375f07698ed3a7ddff4c48e811fdde27d0e3a6f3a5929bf18e96f941a83bd4724b8dec25d20dbf4cf8c586d2fbf65099040d5921408e42c3e

  • memory/2364-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2364-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB