Analysis

  • max time kernel
    120s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/07/2024, 15:09

General

  • Target

    db9575557777d38690a769a0f6c6a870N.exe

  • Size

    54KB

  • MD5

    db9575557777d38690a769a0f6c6a870

  • SHA1

    4953688b383023e72b43d656371e2966e49275c3

  • SHA256

    48e80c1a45ff4bdeb0a175a74cc4383b7a4e91075f3013a6ff441b1d081faa4c

  • SHA512

    a2dddab6b78a568e5a53e7ba2a369fff6dc1b9215bbb42b2f8f11bcc37a60ead5cee3027ee83c6383e7156e143ca0e114d3f727d92e3d1aef3446df1e83291a2

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATNyN6:V7Zf/FAxTWoJJZENTNyN6

Malware Config

Signatures

  • Renames multiple (4259) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\db9575557777d38690a769a0f6c6a870N.exe
    "C:\Users\Admin\AppData\Local\Temp\db9575557777d38690a769a0f6c6a870N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:404

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-464762018-485119342-1613148473-1000\desktop.ini.tmp

          Filesize

          54KB

          MD5

          54e063d354a5860a6002090c013d8058

          SHA1

          239fe2d1eccee64a3dbef59f62451434825084b5

          SHA256

          47dc5ed22d33060c369bb231227ed802917b49cde086790306dce2a7f3c2db32

          SHA512

          1f50125296d99a46d2c05ecba944f4a9cffd339d846470edc9cafa30e63858cabab200f4a1519399c8b4227ff327b5017a835759b74a4cddea2e0c5d7e832831

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          153KB

          MD5

          8e849f5eb9b4a4924c422dcefc45a72e

          SHA1

          e9f8d59053927795f8212406c487862cd3d5baca

          SHA256

          a9cae55d32a426f6117a5c667d813fb9160faf24394004a450b51d70078c9bee

          SHA512

          502eee8fae2a751addfd679ff42cda6331f592a54f10c43b85a38654b16cc7171816126c54265cb26af386aaeae46ef6f48fc39f4c56c61356ad2cd0b15a3482

        • memory/404-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/404-1784-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB