Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/07/2024, 20:29

General

  • Target

    3895820d3c42f8c10cddb5a4c42dd75e6143bc4f79ce1724859c41e4b9e19975.exe

  • Size

    27KB

  • MD5

    5263d6abc4d8b79d078c42c86f081bc4

  • SHA1

    d083c971ddbe6edaf47138823cbef7dedc574d63

  • SHA256

    3895820d3c42f8c10cddb5a4c42dd75e6143bc4f79ce1724859c41e4b9e19975

  • SHA512

    8be4c7237071f32751a615050e488a6a6ab89fc3a309c6b86f31d1bbf64073829cd48030b222fdb7f2fb957ac57cc99daf8784e6196b7a20db70124f75b3c4ad

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcu90TKe+0TKeu:CTWo

Malware Config

Signatures

  • Renames multiple (5014) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3895820d3c42f8c10cddb5a4c42dd75e6143bc4f79ce1724859c41e4b9e19975.exe
    "C:\Users\Admin\AppData\Local\Temp\3895820d3c42f8c10cddb5a4c42dd75e6143bc4f79ce1724859c41e4b9e19975.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:396

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2636447293-1148739154-93880854-1000\desktop.ini.tmp

    Filesize

    28KB

    MD5

    5d08991576db980db590cb62cb42adbe

    SHA1

    308596fa371737678d0178a2d2826f491ffa6126

    SHA256

    518834be0e63c7ab61e1f4ffbed42eb733f31b70c71816d88737dfbbda1ea691

    SHA512

    6a5eb0119edabf052b81e7d2e3538fa976118433a4fcb44f223e61342b8314542eee512cd5472d8c87b172da26e5dff9b75dd6da1e6cfe28ca92e6c9463cc377

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    126KB

    MD5

    45027e3a4de630a1a9501d932ce76ac0

    SHA1

    878347ef6319320049fff96ce88f3acec0cdc1ac

    SHA256

    d37264c388b9b308484aa187a738bab5da70e96667f0457829973809e512a08d

    SHA512

    81c0321c80a204bea8fa32b55a0914ca1754e5ce27b1ad7137d7bfd293f5f0c7cf9cacbf5a748a568700fb18cdc22cbd68274168e4c79dbc6b6af26b55f1a2e3

  • memory/396-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/396-1094-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB