Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 12:23

General

  • Target

    Trojan.Danger.ATA_virussign.com_c3e8580ad3dbbd9b1ba90e02b1c341b9.exe

  • Size

    66KB

  • MD5

    c3e8580ad3dbbd9b1ba90e02b1c341b9

  • SHA1

    88008e603a069eac61a121a6b07afcf3e766e74c

  • SHA256

    6ffb294390f832d822fc347d52c07936c243aeb0fc7da8d76d9e339960ef36ad

  • SHA512

    bb1869ff734305645905e229f3070afaa715a2e8ae9954fb212ed12c4b70eb7a3b31ea222651c6c8311887d99233566b17f78d9773b97f02da4e96fc0d526b4e

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8zxY5NKZDLKZDC:KQSox5WDgDC

Malware Config

Signatures

  • Renames multiple (3438) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Trojan.Danger.ATA_virussign.com_c3e8580ad3dbbd9b1ba90e02b1c341b9.exe
    "C:\Users\Admin\AppData\Local\Temp\Trojan.Danger.ATA_virussign.com_c3e8580ad3dbbd9b1ba90e02b1c341b9.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini.tmp

    Filesize

    67KB

    MD5

    58e344adfb1c4bf5c74291bee0a0502b

    SHA1

    47c893c18c0ad4ac43a7221ba3eccf2efb4d669d

    SHA256

    ea0c63bf76c8951111d3b247f0d93374e587dee02b87a8d5ceea576df86fac9b

    SHA512

    c6b2830139ad9523a953bd43eaffebcaa1dea29f004774b8f8e630fba06b46d3472a17b0ae3f3693dbb23bf5bcc5440014bfbff8c1e54ae6aa013cb70e714ff5

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    76KB

    MD5

    e433eee81cef9b626c37afddbcaae8b8

    SHA1

    b9986d261e22f0aa86c9c97904881f88c0052dec

    SHA256

    a626830bfa578b38edbfca6cbc686094db4adf6a77234ce21571ec3d0a3691b9

    SHA512

    3137d0fbc20d4d66153573117957bce85980c9bc2adda5cb06ab7e91bea864bee472e5b6c04ac6180163c4e2c7508c1ac47f8db7700ae2aba1ca74b94c2a5440

  • memory/2684-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2684-63-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB