Analysis

  • max time kernel
    119s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 20:09

General

  • Target

    5cc5ee4660114500f96aa468280711aef6e50797f9dda052a0ab2b9edbf94574N.exe

  • Size

    100KB

  • MD5

    5134834aafeec02f81139c31c6c37a00

  • SHA1

    d4a0e5d571fb29a5a71e2395c227c9403d624a3f

  • SHA256

    5cc5ee4660114500f96aa468280711aef6e50797f9dda052a0ab2b9edbf94574

  • SHA512

    070d9fdbc00c9b2f123709142ffe3c7b4c3c6f9ce326061a09f033e1af33c7a6914ef5edfc02509d9bf4ff490abcf6b291c4fe78dac9fead1062e098b566d84f

  • SSDEEP

    1536:V7Zf/FAxTWoJJ7TuhvWlhe+eztEJeGKc3r+hGjPSrJfDd:fny1av6wxEVryGjuDd

Malware Config

Signatures

  • Renames multiple (326) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5cc5ee4660114500f96aa468280711aef6e50797f9dda052a0ab2b9edbf94574N.exe
    "C:\Users\Admin\AppData\Local\Temp\5cc5ee4660114500f96aa468280711aef6e50797f9dda052a0ab2b9edbf94574N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-457978338-2990298471-2379561640-1000\desktop.ini.tmp

    Filesize

    100KB

    MD5

    4b28580862c27e7092758b8c683751dc

    SHA1

    0728304eeaeb0965b93b31a63bec4518fb9cce1d

    SHA256

    911caf3f77f5a188ce7ae740313cb5fb76a675d41f62fbb259e77a3ab9ece77b

    SHA512

    43b9c3ee41b91de90a6ceb19a1047c7a382dd37097c6da8993c7621e3c915e26b1583d1ce5f5b0acd44608fafe291fab0ed56643bc00019cd51b51cc01d1cfa1

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    109KB

    MD5

    c8a905084624138f06c06243e46ced8f

    SHA1

    491068facdcb4ee297cea42fa8e095f3b4284f2c

    SHA256

    d5668fde8467b3847b613f38de2eed58ff7a2f340ce7e72de044d57b7a7f2c7e

    SHA512

    800b41fcedcd1cff582dac324faa78beb05238c6ceb9f42461445ddce19b780a6610d04ef4a07971a4a18746093c9e2c96a29d5dc983a02fb2ee3ad79bd5944a

  • memory/2368-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2368-26-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB