Analysis

  • max time kernel
    150s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/07/2024, 18:17

General

  • Target

    048b3b17fccf41d474de4d109b0ad0f32dee7c4d1e222bad9007a280e117766e.exe

  • Size

    78KB

  • MD5

    6b385da34b178c12f7aad38a7f9de4a5

  • SHA1

    9e2fc965f2038f99b5e4d2259b7221a4dba7dc77

  • SHA256

    048b3b17fccf41d474de4d109b0ad0f32dee7c4d1e222bad9007a280e117766e

  • SHA512

    80efbbc21ea9fb3405e962caff173d5e4c66f04083995742b4cb4df5e37cbd3695542d16379c9a077bee1f35afa3d5c89b3be63f8c289d6ce1a8ba712f7deb71

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxY5WyoESyoEa:fnyiQSox5Vpa

Malware Config

Signatures

  • Renames multiple (4731) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\048b3b17fccf41d474de4d109b0ad0f32dee7c4d1e222bad9007a280e117766e.exe
    "C:\Users\Admin\AppData\Local\Temp\048b3b17fccf41d474de4d109b0ad0f32dee7c4d1e222bad9007a280e117766e.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4148

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1176886754-713327781-2233697964-1000\desktop.ini.tmp

          Filesize

          78KB

          MD5

          f473694a72128ddb8b3687cfba8feaa6

          SHA1

          c2381c46f43801e74a108072aa37a526c273b388

          SHA256

          c32b3a396ab92bc4504edabe7238186cc93082a29a526a0c835e3bf63abff746

          SHA512

          4b232ea6e825af0857fda46fdc37ae2574b67604ab1fe762a533ce89da940fbab7a067e701783928e80764c918de8fe07cfc8ad13be4e20c7e5d2134e7f28508

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          177KB

          MD5

          9b2a7a1c5e873874c2682209ad0b3beb

          SHA1

          faf096c916c8aba0cc409c8c70cf8ee6a194b15f

          SHA256

          c5b4a8bc442b6273f87f3fc465dde72ab48f884e9ed1d252f178ee001658821f

          SHA512

          3d7b5792ea1fe477a159fd8e256354c849d8128cdb67f64aa3967ee30672574edf985fc3d5050f4f090b0ebaee2e3b0a97356a9ae35d1758ab64a4464b882cfa

        • memory/4148-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/4148-1772-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB