Analysis

  • max time kernel
    152s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29/09/2024, 20:29

General

  • Target

    3c420e54acd6aa950d23b14b6aed8f91771360b0076a1cce46b8bfbc7aae3000.exe

  • Size

    55KB

  • MD5

    4505ca688eda0faffbdecf48a9e6ba91

  • SHA1

    b743d0e3d71944c6a4657d90e21c92855236240a

  • SHA256

    3c420e54acd6aa950d23b14b6aed8f91771360b0076a1cce46b8bfbc7aae3000

  • SHA512

    1ad409c756d2d25eb5d862c7839369e1849329a45a52dfa0174704a46ecfaf607360aa9b141dbcb1dc1d4cee455363322628aa46ed283ddb2c17d09e35e25903

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcu90TKe+0TKeinMdj:CTWUnMdyGdy4AnAP4YrMe

Malware Config

Signatures

  • Renames multiple (855) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c420e54acd6aa950d23b14b6aed8f91771360b0076a1cce46b8bfbc7aae3000.exe
    "C:\Users\Admin\AppData\Local\Temp\3c420e54acd6aa950d23b14b6aed8f91771360b0076a1cce46b8bfbc7aae3000.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-457978338-2990298471-2379561640-1000\desktop.ini.tmp

    Filesize

    55KB

    MD5

    9f88a45d7f9e27d9916125a9f251db73

    SHA1

    68eef5825f59d36ffece91c741eeab307472011c

    SHA256

    c152a2cc3ce18eee0e65901bb1d69c17d3012ba510a816dd201c28d2bf01a4c4

    SHA512

    926c1dae478e1ce2dc53537ce62b55116916f950d1b599c232a0b6f298dceb15eacc9b9ca328ed4df4dd3adb3cbbc3044df4b120a68b56b906a8f7fcf89c3ec5

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    64KB

    MD5

    363034b72621ffcfbb1c657eb6d68a1c

    SHA1

    4e0d1bdc6fb9681797fad8bfd56dd76d5da4194a

    SHA256

    cb811adb257927f638f2517ac29de47dc0e6da51ab17df0c24adf955e86343a4

    SHA512

    92593907fa36dc067cfab9c3083fc6d7165834c493a7b1b2cf51b0112a76000efc3be9391b325d600644735101642c665706aa0ef0b3b4f274f93112debcb369

  • memory/2060-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2060-19-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB