Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14/09/2024, 11:30

General

  • Target

    c06fa66d78772575e2deea6d48505850N.exe

  • Size

    144KB

  • MD5

    c06fa66d78772575e2deea6d48505850

  • SHA1

    156622fe1b42d4da1250e156b8e0a45bf59bb987

  • SHA256

    851b5af4dc8af34971a33c4a4c6df53cb9fad60e91977e542fbb1978473b704f

  • SHA512

    bf1f353cbf9663375ef032c079958b4a5302a464afedb4a065b099ee0f8ccaeafb1ea8917ca9ba0347ee4be2ccd554bf3bf54170723c78539a41f49f2bd24490

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxY5dN74uTWn1++PJHJXA/OsIZfzc3/z:fnyiQSox5/QSox5Y

Malware Config

Signatures

  • Renames multiple (2837) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c06fa66d78772575e2deea6d48505850N.exe
    "C:\Users\Admin\AppData\Local\Temp\c06fa66d78772575e2deea6d48505850N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2560

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

          Filesize

          144KB

          MD5

          9e50da851808112bc0004a068fa26d0e

          SHA1

          edc8e3d06d869c13b044fc2caaf7ee608e39644d

          SHA256

          e5abe7140617fa88ed7a0473a8c2e598ed5ec5752259bd7802b24c1bdf034508

          SHA512

          71380e3badac7867bfa8dc539a83f9622ef379945ffc0e7704e72ad9737f8f7d494783fef92937d6dec2bb6d9114fabd3675910a34fc9d9dabc55a5029d7693e

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          153KB

          MD5

          2b458f3f4a6eba3168907dfa734d83ac

          SHA1

          dd03f9d6b008ddb2ad5879e31bad1a639ab9596d

          SHA256

          a36766a48651d4da5e2483fd2f926ecbcfbbdb77f819a9e21b8bf75f963e4cdb

          SHA512

          c97bf4db0fc11f8f9fee4469b4101738fc3cd72cbdfa9fc31857343d29c2febc6793f446b0ec18a11168f01914c3d5713931e66b57aefd8950f430e407c5a3df

        • memory/2560-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2560-70-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB