Analysis

  • max time kernel
    120s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/07/2024, 01:57

General

  • Target

    3669e3b5680ed83e07b324ab5ac77fe0N.exe

  • Size

    143KB

  • MD5

    3669e3b5680ed83e07b324ab5ac77fe0

  • SHA1

    1f145e2ce8d7d682b8cff4c26201dc15922a1a50

  • SHA256

    a6b216151589725924baea2de945ba86acb25bbd7ba58aabab07b55068b9084f

  • SHA512

    712242df4006d69f965a00ac6680c1a8d9eb028f6337b99544319d9e7d2cfb9b198c90a8c409d73bcf2fa8e50e7345fadc980dda2cdaa8b9117e538fb2dc9b6c

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8NCuXYRY5I2InTWn1++PJHJXA/OsIZfz1:fnyiQSoDuXuv3jQSoDuXuv3J0z05

Malware Config

Signatures

  • Renames multiple (4211) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3669e3b5680ed83e07b324ab5ac77fe0N.exe
    "C:\Users\Admin\AppData\Local\Temp\3669e3b5680ed83e07b324ab5ac77fe0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2660

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3419463127-3903270268-2580331543-1000\desktop.ini.tmp

          Filesize

          143KB

          MD5

          d607d81ce368952a9bb25623467f293f

          SHA1

          6c1be4814a83d4b3507bfc560976cc4b663c852f

          SHA256

          73394bcea0089e895ac9f7547f4554b31a6448d9f300d0cd82061e86dd208d2e

          SHA512

          b299be0886a8e568f12ae8349dc08af6a46807c134c7180ab1b4a5a87b02762cd9fe9d99d8b3c5795f95bfd6fb37960ce01a4fc6bf7d1ce2447e7f0602df2924

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          242KB

          MD5

          91c52d49d3bc4efbf5ab616d712d56f6

          SHA1

          5fc15296f78a58ef078b350ceaedce51306520fc

          SHA256

          f84b918d729b168435b49c0909c769044dc5353599360e80f93a44180916a666

          SHA512

          d4c19f8f00e1f7bb408b69802e0de5cb60c0d2a96481f1fce266bb0e00602bdb683633c59c1931657fe2ed1e34cee7571f88b46ed6884659cf4fafaa7808e9f9

        • memory/2660-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2660-1742-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB