Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    01-09-2024 02:54

General

  • Target

    cc1a4622e8f2e3a5fea367cddfa1a338c7b18eadb672be9ba6f083fdac94b0f6.exe

  • Size

    589KB

  • MD5

    988c8b5f797388961e4ba7c1440fa31e

  • SHA1

    57bddb20ccd3dedf28c2d677ab6c9c0ee3d0831e

  • SHA256

    cc1a4622e8f2e3a5fea367cddfa1a338c7b18eadb672be9ba6f083fdac94b0f6

  • SHA512

    97b908f11e330db5106bacc4ee857d647a0f831261f3d9f587b5414c15d44e986f0046c473df760cccd905eaf4c2f69e21e470e80f17a15ec7b90f70f20b1a64

  • SSDEEP

    12288:VQtAJOPMdl5b/wn0Z147JaYCT77MNXYnno/28:VIARxnrF74Yo/28

Malware Config

Signatures

  • Renames multiple (1911) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc1a4622e8f2e3a5fea367cddfa1a338c7b18eadb672be9ba6f083fdac94b0f6.exe
    "C:\Users\Admin\AppData\Local\Temp\cc1a4622e8f2e3a5fea367cddfa1a338c7b18eadb672be9ba6f083fdac94b0f6.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    590KB

    MD5

    63d88443bb0f5d9d1ab4ab0f3476c5d2

    SHA1

    6ddc8f1be3811fe54415474b6ca3d24538ed2b0d

    SHA256

    a580b90a744d802494409971aa69e788bcd0b40ebcb12421c143aaad7d7cd8af

    SHA512

    03281e0fcc863756c41f2cc859a90143c4739246e043ac3dad370b97e0ae429a6c418a2f2000279248f73e37dfb858f6f6f49827585e3141ead90434e19f2007

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    598KB

    MD5

    b98abcf8ab29c73b10cdc1b13a3c1060

    SHA1

    ee6f6550541e084c6c844d86b56f929837405c24

    SHA256

    8e1b4517ab121e38412af3f7aa313ac0ac41b78c5379716a96a320391b745030

    SHA512

    496432f0d9407000c2ac46a9e0566051eb4306306259a5c5b01c642a3a13c1544f2114f39bcfd68763e81bbcf66fe12a1b652962968718458337793f9c2511f8

  • memory/2840-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2840-68-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB