Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-09-2024 19:24

General

  • Target

    1c080bf45271a1368ecc61ddcf74c03609ab3480f2b6dcc29573a54b40829775.exe

  • Size

    28KB

  • MD5

    21270dc798de899a196d3e60e49c6977

  • SHA1

    12779ea88a58926e7444ec55990a19dd85f7a61b

  • SHA256

    1c080bf45271a1368ecc61ddcf74c03609ab3480f2b6dcc29573a54b40829775

  • SHA512

    6ca668aa4c5158bd79d3b973ac5a044e6fcd466846bb5d76217b5e2a0f8d6b0dab14d56967e2dd7f96a34251d704237c2b40f22e8daec467a87a5a357067a938

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9zkrMeIrSRkrMeIrSa:CTW7JJ7TReLeAeLeR

Malware Config

Signatures

  • Renames multiple (3869) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c080bf45271a1368ecc61ddcf74c03609ab3480f2b6dcc29573a54b40829775.exe
    "C:\Users\Admin\AppData\Local\Temp\1c080bf45271a1368ecc61ddcf74c03609ab3480f2b6dcc29573a54b40829775.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-312935884-697965778-3955649944-1000\desktop.ini.tmp

    Filesize

    28KB

    MD5

    9182de253b785efb90db4077f479bf34

    SHA1

    65d7d87c908e67e3ed159e6506d4bda96e351245

    SHA256

    348008212497216d66d55d49831856d73c107134eb1702470a45552ff971c531

    SHA512

    ca0a702f084aefc0457a856b6e5a81cd2e09a565cdacd1c4294a541fe9093b5df5c64e3f4a15444b70ba63e3b7e3dab045c799d9c40e1352c3b0575b05524dd8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    37KB

    MD5

    591428879bbad9fa9327bd9330e2ac2b

    SHA1

    d2fa80e0182019ceeb9ae83770a021109179c963

    SHA256

    aa54c44585e8656710d8b3e3c90acec1e9677ddf7a340d2be7c0828408eae410

    SHA512

    11c17c9c71f4adfef7e2ef9c4bbab2b51d3dbe39282672995dcd55d9c778a1c9f19313ba46f9d8505e8d5391c5a12f2e88222fa506199d786fa3e2287dd3af3a

  • memory/2756-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2756-70-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB