Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 12:47

General

  • Target

    Trojan.Danger.ATA_virussign.com_c012179cf4b0934f89f02ed34635644f.exe

  • Size

    71KB

  • MD5

    c012179cf4b0934f89f02ed34635644f

  • SHA1

    4fc1d2c63f3e02d48bbaa03450abcade256f89a6

  • SHA256

    36f088729d355e5c4f7e16a0bb5b72a52d8c17a8d90adeac2b4ae241c04dd53d

  • SHA512

    d34a325998ce58e8cf3f05a004946ec214779ea8a75b6bea2fc713f6584c910d7375b943a424f57b90e9a12d0ecf38f9d5d06184e6a006b0cf6f54253ddbf746

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATBWvyBh85c54wWq:V7Zf/FAxTWoJJZENTBWv36Z

Malware Config

Signatures

  • Renames multiple (3149) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Trojan.Danger.ATA_virussign.com_c012179cf4b0934f89f02ed34635644f.exe
    "C:\Users\Admin\AppData\Local\Temp\Trojan.Danger.ATA_virussign.com_c012179cf4b0934f89f02ed34635644f.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    72KB

    MD5

    9e0543c117f6c7237a5712ffce67febd

    SHA1

    8f6d9cb0a976eda2891bd6604997c47d80db8754

    SHA256

    b5d6d37cbd36c459bac26da01f8f19b867a0af884d2a715abe24122497c61f20

    SHA512

    d82277aee55130781eb2a7563338fe325fd2e65e7d5edcbadfe862202fbcace12c168150d2a0d68b97ad0b3eeaa719d467d42f97a3c6f55e27ec2705028fdd32

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    81KB

    MD5

    b74bd4da0f55efdc8645eab93c9e2d64

    SHA1

    60e46c2baf98a9a3da500b96e3817f595a3a6993

    SHA256

    c99f9d497b3298f90bb03ffdab7dc9b62b59a1e90cb6f8902b49e67a42c17df3

    SHA512

    8fd2e8ef30bbb9911afc5751a98e68f2ca43fc83e3e5e207029106f0af54071d676c54237e5d82906002dd0e9d86473c82691d6587ad442aa41f644a2d53b8ce

  • memory/2504-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2504-48-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB