Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 02:37

General

  • Target

    dcc76d1cecc569f397aa9f0152cc0e780fc5d1be56537326b5ebaa643a69bb6b.exe

  • Size

    117KB

  • MD5

    84fcbdd253da4c3111cd9267e3191512

  • SHA1

    23861fd8c017a5275b52489878b50d95f35ead71

  • SHA256

    dcc76d1cecc569f397aa9f0152cc0e780fc5d1be56537326b5ebaa643a69bb6b

  • SHA512

    2b0b2387471a3275312ecdae36dc7f531b1ba4417781a86124d0b532e050b64fa73b246e842dd5d3b42518e00763ee7df8fb2126a3b4bb35dd20cbe477331c67

  • SSDEEP

    1536:V7Zf/FAxTWoJJ7TkGdAK1I0/yrOFrGqGIkbd8EfRJY0g+FLRnBAYuApg4VnspieK:fny1f+d

Malware Config

Signatures

  • Renames multiple (3440) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\dcc76d1cecc569f397aa9f0152cc0e780fc5d1be56537326b5ebaa643a69bb6b.exe
    "C:\Users\Admin\AppData\Local\Temp\dcc76d1cecc569f397aa9f0152cc0e780fc5d1be56537326b5ebaa643a69bb6b.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    117KB

    MD5

    5f412a2fa3787f96e5be8f3aadbefa61

    SHA1

    5ae74fcdc596e20328cb96dbd5ab58ff41ba97e1

    SHA256

    f94fbc9d7db320a9d2222b1dfb0003a037207de9fe1cfeeb7655726b26533e81

    SHA512

    59af8baf69776ddc8d1653cd1db171f14d7040f8fe8c2b6fd485d61e43aa1ba53801142c80e71e6f485da63cbc95cc8c795a9d35991fd5ec90569529fd8554d0

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    126KB

    MD5

    49e9d1d30f7fb6713cecf3eebf90bcf4

    SHA1

    8e5b763d8ff7b5aa10f8a5f107ba375958c7e3cd

    SHA256

    44935dac0d1211e057b6c62984cdda48e9440d831f2758738f8bd35eae504977

    SHA512

    25558d306dc11bd7cd711687d66027cc38f64ea403fc0ee2d57f0d33830797cbe3c98590602e0d529fd951cddcc8b9dd4e582606cdd29399d665fb6d57444f3d

  • memory/1852-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1852-68-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB