Analysis

  • max time kernel
    150s
  • max time network
    15s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26/08/2024, 02:37

General

  • Target

    c0f006175b0f8b6f889937965ccfdc10dc91a7fd27823ca8cb11d0d076083f1a.exe

  • Size

    37KB

  • MD5

    26a82dea9b4018c280f3fa55063d9247

  • SHA1

    d4900fd91f176ed4769a81898a8e3c6c03d2436a

  • SHA256

    c0f006175b0f8b6f889937965ccfdc10dc91a7fd27823ca8cb11d0d076083f1a

  • SHA512

    68efaa46790597d456cd9c01b89a80153f9f8d579ea21a82fde3a7602ccec66eea48b24b5dd68148f665d9b062497049a73334957dffb5865ac1a8b17444af4c

  • SSDEEP

    768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATNydWK9WKF9ADJ59ADJsmrIvg:CTW7JJZENTNyoKIKMmrIvg

Malware Config

Signatures

  • Renames multiple (1170) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0f006175b0f8b6f889937965ccfdc10dc91a7fd27823ca8cb11d0d076083f1a.exe
    "C:\Users\Admin\AppData\Local\Temp\c0f006175b0f8b6f889937965ccfdc10dc91a7fd27823ca8cb11d0d076083f1a.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3012

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

          Filesize

          37KB

          MD5

          f69c7048cc056d4b712fa15aaa3a1151

          SHA1

          bd0c51b520dcf97467f146a16161a83cef8f944f

          SHA256

          1096fd664da0e976962bc78d873dd6d56eee0acd147471cbc1d9d1de54421e2c

          SHA512

          d4184272628eaebcc5766344750673a9e97add878a9d5ccc337c5a1bfaacac905ae44bda9fc221dca07cb8ae1de037443f859f779a876068ac21da37c0dd8668

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          46KB

          MD5

          2340022743c47191e79fc107f9c244ed

          SHA1

          59206b891ec52f3f8b0eb8ffb72d50173f6a0529

          SHA256

          bd78944b4503b2778c391b8b57ce9018e9a90dd9e28d2f5b52072b0545409659

          SHA512

          2d870f2b349dd40cae40317cbdafe68a1e14aa053fe3a7dbeaae8473e88b6ee1bf34274764a867f7e79ff72d9d190a08d8f476bd84b9a33050195deb448aecd9

        • memory/3012-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/3012-27-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB