Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02-09-2024 11:14

General

  • Target

    c05ab772cffa771f3f489b3e151b4650N.exe

  • Size

    45KB

  • MD5

    c05ab772cffa771f3f489b3e151b4650

  • SHA1

    1ccd5519fac2db35873f4a7ae578ec6be4369d3b

  • SHA256

    15c1a92eb466e225f23bb6b1cfa7d1c1bd0dc8300f68998a403b80f8a0a7aa57

  • SHA512

    7950e9c3c11d5fc5d62423986c5f376375c5d92ceef3f58af0c632244dec9f40b4f1c913e922382693d3a4d6b5ff789f668ac0129fd2aa6e9132616f89bb7eee

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9HXEpwuD7I/pwuD7I5yAohGCYyAohG6dwEbds:CTW7JJ7TFXCwnwDy4CYy46dwEbdwEU

Malware Config

Signatures

  • Renames multiple (3273) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c05ab772cffa771f3f489b3e151b4650N.exe
    "C:\Users\Admin\AppData\Local\Temp\c05ab772cffa771f3f489b3e151b4650N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2076

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

    Filesize

    45KB

    MD5

    83628faef22167b7fa4c52f27a7d5463

    SHA1

    da58d23696dea6e13de2d9fa6824d611b52a29f3

    SHA256

    d6b53aafb0339a77fba460f095c11e9d94226c33f2a3217fb15029693a2708ed

    SHA512

    9f148fd8a5635dd5ed67a38fe29b036b4ed6660661ce4753ad3b1f1cd7aa761f2b81be13a8d22d0fde357b1c9d156fe260b4da2083769d85fed7b60960e856fb

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    54KB

    MD5

    ea529622c91731d8574934df33acc544

    SHA1

    e90cde935fab3f43169151d66c94060ba9da8a4d

    SHA256

    dbb0a6b189d0789baba116583afa56ac84d4e18968c1f647d9013d325734eabe

    SHA512

    afbdcc6a756885dde41ce226789bccc904426195a8af9c54d64abb2a305735d1f66b85b62ead77b413edeb3821df0aa8ef3926c1ad154c56199f73e3a57209f8

  • memory/2076-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2076-71-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB