Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-07-2024 20:50

General

  • Target

    41c34dc55f234d83c0ef3152530befa4b39dc286807eeaf3c793d926e45e6066.exe

  • Size

    23KB

  • MD5

    5bfb4e03e6e614d988c78d44e7b1bbd8

  • SHA1

    7a0fd65bddf3636a373d4ce4f9e83c5d14e4de8f

  • SHA256

    41c34dc55f234d83c0ef3152530befa4b39dc286807eeaf3c793d926e45e6066

  • SHA512

    4f518811cb8ae9f64bb30895b95dce5e9d9c946529c58961ab2fffd0ea02e61eceb48297cb57d0260932e471ad058d2f8e4bc25e57e0abf4d175cb95e2a54233

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJPbUEobUE51li6A6U:kBT37CPKKdJJTU3U2l6

Malware Config

Signatures

  • Renames multiple (5042) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\41c34dc55f234d83c0ef3152530befa4b39dc286807eeaf3c793d926e45e6066.exe
    "C:\Users\Admin\AppData\Local\Temp\41c34dc55f234d83c0ef3152530befa4b39dc286807eeaf3c793d926e45e6066.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1176886754-713327781-2233697964-1000\desktop.ini.tmp

    Filesize

    24KB

    MD5

    320d7c67571d7c69bcaae31a4fc0736d

    SHA1

    0844637d0e7a79998d533da917c040b36f639bf7

    SHA256

    146d1b306e6958f5d1b1dd5c0ed65185c23fd40ac51513ca33273db7e8e6581c

    SHA512

    3cc08d11ba8531bf0c5eef7523f69dcd513a1d86d2ff63e7206933131c5b579557a86a1f42c95081a22650c85196c7f2f966b65755856a63c1f64625c675a564

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    122KB

    MD5

    7935da46367640ad32c56f755b519508

    SHA1

    ec2c09b87ef14e5cdf3bb754135eb2b5d3522ee6

    SHA256

    e5755078345d5d231e7dc697c909c5b6319298084603088c1b79965fdc6420d0

    SHA512

    099bc48f84c6e7f0170651484b81b0bd0b67910bfa7a68f565defacf1412d529a9b8f60d69c6fcdb9d946b7ae7b79da27d9e481f863f182f90b36609cc23894e

  • memory/4916-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4916-1108-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB