Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/07/2024, 21:16

General

  • Target

    4a96f2f35bcd8e287348310ef9c6a564bd4ea51df0b10e5188d8ec1d5a8495b2.exe

  • Size

    56KB

  • MD5

    8f282c364ae7dbf3534c6870904ce4aa

  • SHA1

    5917997487630822ff9c2db0a93182d67633b0f1

  • SHA256

    4a96f2f35bcd8e287348310ef9c6a564bd4ea51df0b10e5188d8ec1d5a8495b2

  • SHA512

    91afe013feaec8fc4c20f18daa532509c4120b53283bdf352f694900e7254e2afc3309f53cd63218e79fcac615784f74715356fc7e274c64893f6c2daf9c0a2a

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rX:V7Zf/FAxTWgGpGa

Malware Config

Signatures

  • Renames multiple (5189) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4a96f2f35bcd8e287348310ef9c6a564bd4ea51df0b10e5188d8ec1d5a8495b2.exe
    "C:\Users\Admin\AppData\Local\Temp\4a96f2f35bcd8e287348310ef9c6a564bd4ea51df0b10e5188d8ec1d5a8495b2.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2990742725-2267136959-192470804-1000\desktop.ini.tmp

    Filesize

    57KB

    MD5

    5247b16ba1130975abaef4b9b0d04f0c

    SHA1

    15723efe8ea187a3fab1287694605e5476fc68f6

    SHA256

    42f0363dc8563b334865cbe6f47be18d8c34aa880e52d9861ea654ca431a4b7d

    SHA512

    cc3457a6db8297fe3b7aa884fa8c6c48114f8db9dba0ed15e3fe0e2ecf546ec60fc1db67ce26575cb57f1796bbe42253151665a9ccf963a14540d9be998c7076

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    155KB

    MD5

    98eef2dc97523f96204b278a4c75fab1

    SHA1

    9ae278e9b0e922ed4dc906fe1bfd561ea4cba70d

    SHA256

    abcaa69dab2f58f81cf30b88ee615022bdb31e2bb8ad705123c48cd7886204c0

    SHA512

    bb3ee8d5bdbf68e82357b1ab97138a0651d1ea9c1699251530dea1aab0c73efe2f64692a043ad7c6b98ee1df709b7d0a1f7f163a63e17ad7892bb74c4b4d8ab5

  • memory/3532-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3532-1890-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB