Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02/09/2024, 01:10

General

  • Target

    17c30a6d5fb034e1e8d309929dd9aac0N.exe

  • Size

    97KB

  • MD5

    17c30a6d5fb034e1e8d309929dd9aac0

  • SHA1

    1c3e31ce321ce67b44979a947d9c7e65b0e01e3a

  • SHA256

    06c55e6b7c1ee0fd40ebbb886dc746367142aeccad49d9d149bd8577fee2aa40

  • SHA512

    3cc6460a726633bd3bd3b368f773461ffda6b5286738afee52c5a86efcfb8caa5ee93805f95acaeb14bf6c34a833878a7b3ac28d31745d64238c9328b7c0e3eb

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zx4LgLuaYNB17Z:fnyiQSoFcs

Malware Config

Signatures

  • Renames multiple (2846) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\17c30a6d5fb034e1e8d309929dd9aac0N.exe
    "C:\Users\Admin\AppData\Local\Temp\17c30a6d5fb034e1e8d309929dd9aac0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    97KB

    MD5

    621b38bb1ead58af68d51d75d0b6d365

    SHA1

    b87bfbbf724e4c79702d87032789a70a0843c889

    SHA256

    abb0f90f040c848f4d4f8c1c348e775ded9e7423b69d8dd8aa6fd643d6abbd20

    SHA512

    50beadcc142ae01174310efc7e712416931b91c5a6370c3a205ba34c46e494d8f1bb503e3b15e3662877f884e1a4cb9a94df1c3de9670aecced80362f46efa31

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    106KB

    MD5

    c8e218e38e146d00c5c15d12626b01bc

    SHA1

    f79625e6871b8bafcfb61ebd41876591b79f8533

    SHA256

    bf242d7adb3ecbae7532dc490777745880dd3366ae482e1e6afbb7782f3caa95

    SHA512

    765e5f588b9fcb06c33b0d169f3b69bd1249ae116d9016119dcb07a50a6be4b138f3caceb946749ebad21b0c5672d977c3213a449f9623fd566058a4ac25e5bd

  • memory/2356-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2356-70-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB