Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/09/2024, 04:00

General

  • Target

    ca226b42d38a747e21571cc09025cbc0N.exe

  • Size

    76KB

  • MD5

    ca226b42d38a747e21571cc09025cbc0

  • SHA1

    313988561ead0b2a179d8c2c25a15d46d044908f

  • SHA256

    c4bd8a6a5ba2fa5b8247e67ffb1902664225642eac0a21cebc145965e64fc856

  • SHA512

    dadac8d9326f84a42fefc66ff6fa95f8e6c5e3a5e75ed2697b0d77d37186b988de17210ee51b93e021a9a95664748998e2568ec5a756e0c18000ba735a0587fc

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9woOzOuiJfoOzOuiJ1BT8:V7Zf/FAxTWoJJ7T4MgTW7JJ7T4Mt

Malware Config

Signatures

  • Renames multiple (3209) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ca226b42d38a747e21571cc09025cbc0N.exe
    "C:\Users\Admin\AppData\Local\Temp\ca226b42d38a747e21571cc09025cbc0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2072

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3063565911-2056067323-3330884624-1000\desktop.ini.tmp

          Filesize

          76KB

          MD5

          ee75a56ef0f6317794156d89c3332105

          SHA1

          2daf0271b6d2ec0fb77cdd2fc20dae202d7a2332

          SHA256

          377bc5052fc7ee55c1085416979dc77ff8d65ebe7b5484d0787120694a8e3a98

          SHA512

          13904563a48fbca88ea86f6f5be0c11f5f96dc2b56868b1c02296463c489545916b113f97dd1aea9c8eed4f700f41dcb02483d0eb6ac998b39f4bc5eb72b1f7f

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          85KB

          MD5

          fb565a8d309a7a7c90e2f4898b195f0b

          SHA1

          a6b612073a1707a656793b6e1139703fde45d1d6

          SHA256

          4524b5d0160040582e9d025ebdadaa51a55b37ad7d725d602f131b0f0b3dcf1a

          SHA512

          ce1b625177f9d72a388d07c7ec5e505a93b1f71d0b148bfaffee76c42d1cf614523c38167786f6a8ae8f8394bd1b28d6b77f17544df7493b0e4b6298afba02cb

        • memory/2072-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2072-74-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB