Analysis

  • max time kernel
    120s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/07/2024, 19:39

General

  • Target

    effd76e9c500e29440f57ccf879f7820N.exe

  • Size

    88KB

  • MD5

    effd76e9c500e29440f57ccf879f7820

  • SHA1

    39dd16595d4bfbdf96f28802bc330afe37c44408

  • SHA256

    821554de9f2716b78b19b251e7308e975dc8693703b66593a661366e16c912ac

  • SHA512

    f28c47952ccef0ab5df00829a1caebb5a9ce4901d5cca856f9d9ad33fdab0fd8533354d5a4f7f3522480e06c2416be6736276667364aa3a0add9a7fce1647f96

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxSL3duXdXp:fnyiQSo5LwtZ

Malware Config

Signatures

  • Renames multiple (4203) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\effd76e9c500e29440f57ccf879f7820N.exe
    "C:\Users\Admin\AppData\Local\Temp\effd76e9c500e29440f57ccf879f7820N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2556

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3419463127-3903270268-2580331543-1000\desktop.ini.tmp

          Filesize

          89KB

          MD5

          b02e3e3166ad2d67167a4e4210d0adab

          SHA1

          fc1969a1b02cf9e23b9dfe1644b432c26032c08d

          SHA256

          774fb7798b14781cd70025955b81c57249d80f975a0bde7c4a556aab6432e435

          SHA512

          3c8fc9c855eff5e3ccfe2ada999d67c8eeed282c9df6a20ec4be79ed420405799ea5636d344dd90ae5c6fb42e0a0bc5d474e6e6180e05ab8fdae54e2333fe522

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          188KB

          MD5

          724c517d505a68c7d46b5bdac2f37cbf

          SHA1

          458928bc154241c391b5202c3559a78b39b17358

          SHA256

          3b0b1259eb02cc786a4d27ff425ba45306a4c8ee458124ab5bf852f7fd7f4420

          SHA512

          e310062ba0e301dcc72ae7f51b5a4c1cd3d442795cb8740c0f69c389f4a3fc3b133b38243055361972e66384e88dc7ec1cb5a7412c5fdcc5b5e354d5a0c74ce8

        • memory/2556-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2556-1594-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB