Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    03-09-2024 02:40

General

  • Target

    c6daf997611ca7063a3b8b89f21a8ef0N.exe

  • Size

    53KB

  • MD5

    c6daf997611ca7063a3b8b89f21a8ef0

  • SHA1

    0658572b807092bea8adc6f0c6d883ad78f870ae

  • SHA256

    77e06b622c6f9c0c3cc1775281ff42ca177dd32a01c061fb0004fc50a8646864

  • SHA512

    3db2b98ade2999e37a96145d872c549fa4d754b4195e613c99178e37be745bf10edc5d363e77f09a1f457de89befd897cdeb3379557149dfedbb8f7d9483e018

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9B6rhbLRi1x1bLRi1x7:V7Zf/FAxTWoJJ7TOh38R38P

Malware Config

Signatures

  • Renames multiple (3252) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6daf997611ca7063a3b8b89f21a8ef0N.exe
    "C:\Users\Admin\AppData\Local\Temp\c6daf997611ca7063a3b8b89f21a8ef0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    53KB

    MD5

    7e62e2e8e0a627f3d9298bf70dbe0cf9

    SHA1

    92ecbdab1f7581bee1a0d8424f83ccedbdb2d702

    SHA256

    9aab74ae251360b5ac3caa5489c55499a31ab31b4edf6d28fadab6f04efb38eb

    SHA512

    56c84fc3e2ee6cf2e25127e541307965dd14b11f9d4d3f112089635b24be66be47856ae9fea7c2a0c1b2733a3596feb6f1ebb852b4e96e561a1329d29685e61f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    62KB

    MD5

    fe398acfcef22936fdaab35ba3957a76

    SHA1

    9866ea5b2dda39e00ed1e2895bb4004ac12113a6

    SHA256

    0c08a94ba3a1123a4dad68e197035d6a30df60c6551469df4c3d0d2f614b4a4c

    SHA512

    2a909ca52791f05cadbe29299dc1296e47d3e8d5702f9af74586009d1098adf15ba76b769210fbec993b8a65dadcecb7661a025a0d930b8ea36c895cc1d76777

  • memory/1720-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1720-72-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB