Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/07/2024, 02:58

General

  • Target

    c8925df597f43497bf45cd68bc9d550b9bad1c2f791cdc9e0412c97134ad2c59.exe

  • Size

    81KB

  • MD5

    e80e7a50eb4aefc7607b4d0ae0c4be34

  • SHA1

    30425946056927bbf21c3f8263dc671f00931d1d

  • SHA256

    c8925df597f43497bf45cd68bc9d550b9bad1c2f791cdc9e0412c97134ad2c59

  • SHA512

    0a07640c7e530d729ed981f8242ccd98a61c90c1573c678e73a545bbf214c672b3071b92c9a04aca1cbb32672345f938154be6f96585e1f421a07c5c3016133f

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTNyl2Sm0muTW7JJZENTNyl2Sm0mI:fny1tE427tE42C

Malware Config

Signatures

  • Renames multiple (4722) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c8925df597f43497bf45cd68bc9d550b9bad1c2f791cdc9e0412c97134ad2c59.exe
    "C:\Users\Admin\AppData\Local\Temp\c8925df597f43497bf45cd68bc9d550b9bad1c2f791cdc9e0412c97134ad2c59.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1705699165-553239100-4129523827-1000\desktop.ini.tmp

    Filesize

    81KB

    MD5

    5c96fdb4f4f174ba925101c85200cea4

    SHA1

    c6be2287140cb5c5411c49fc64cc26cc8567fd0b

    SHA256

    c8e0b246acb77952f4be0f4c3a63c57e7fafd87b4b2071f04c91b17586d84d3b

    SHA512

    9fb3a97180ad5f3038b4e137ee14a4edc3288dfbb6904b653c04a22f2575f37d014376161ac908bebdf5fd7fd4402bda42571be8543cd512bafe8889da2b55ea

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    180KB

    MD5

    ee617f3d38e5c25807af7fc20a194dbd

    SHA1

    c168896977632dd602d833093fb228d010992f2b

    SHA256

    4aba970a7b7ee16109fe1ecfa8e50201a1a075e2ede9cbd54334a43411953bb3

    SHA512

    84799ae3762b8121246329593412af115df7180689468e271777f616643337b24feee90a1195bdb87d984011e3e3ec2703b9ffb54494056f508b1a1afa28f56e

  • memory/220-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/220-1712-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB