Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/07/2024, 04:42

General

  • Target

    f10cf63d4c7ab924329386bdc077a6806223bfc7bcf5394c683eb146d07a9085.exe

  • Size

    46KB

  • MD5

    13a0b6fac215e35cdf826b9f2dd40eb0

  • SHA1

    5dc9cd1a6e2ca4af8284a11d126ffde50335bdf9

  • SHA256

    f10cf63d4c7ab924329386bdc077a6806223bfc7bcf5394c683eb146d07a9085

  • SHA512

    b815941114c230febb0ecc86132735918f16ea2439d3b3d72559624dbc3708e61737332970ef36635b074d704be275af1c26e90e1a2ed35bc40cd1961f42378b

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJBZBZaOAOIB3jM2jMO/mg:V7Zf/FAxTWoJJB7LD2I2Iy

Malware Config

Signatures

  • Renames multiple (5015) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f10cf63d4c7ab924329386bdc077a6806223bfc7bcf5394c683eb146d07a9085.exe
    "C:\Users\Admin\AppData\Local\Temp\f10cf63d4c7ab924329386bdc077a6806223bfc7bcf5394c683eb146d07a9085.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3132

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1403246978-718555486-3105247137-1000\desktop.ini.tmp

    Filesize

    46KB

    MD5

    35e0598986716bfbc59559313f4d9f0a

    SHA1

    c2b7cebeb3bb31dc2f4b114b05603fb90af86a4e

    SHA256

    45b4de4323e2a0a6956af1a6eb16d1a3da9a7c76fca4ccde3972c55baacfb5d7

    SHA512

    8fa6977d069039fb755fcd679f6db4a1935c3407d3af89f957ab6ee74b6bfc56a499a58a642dd12f615810085b6281c43358e8c6109c3da857b8bac29e3080d8

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    145KB

    MD5

    81bc57287ed75066339018c6dd8a07d4

    SHA1

    804cb75a5555e869703e205a89b836626d3933e4

    SHA256

    7d01301bfdf82be2a7b68049a058e08b9ed599068ec7490bea6b6f6ff17611b3

    SHA512

    a9a96ba3355e176b976bfc87c13e04f6faf610d9df4ecc92483510cacbf9a243d4d215c0815732958234bb551ae8cc3ef2c90b15afb53b41426b580bc85e494f

  • memory/3132-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3132-1794-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB