Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-07-2024 22:42

General

  • Target

    658506d33b08221c5d02632f2cd8d46d08a919876df4a69683492192c99771e1.exe

  • Size

    68KB

  • MD5

    9255ee93a98f8a29153ce70438363df3

  • SHA1

    c2b1cce8b3c65862275d990dd242c47af2d07b88

  • SHA256

    658506d33b08221c5d02632f2cd8d46d08a919876df4a69683492192c99771e1

  • SHA512

    804cbef3e4886cbf7514bbb24d3cd2b3151047f72b8b928f4cf0a5ef8eca1e2c79b1d759b0859d632a54983bde3d8c10a43516ffda7cfe5588344c49bcc76695

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8zxviYiaEx5ck:KQSo4iYi7

Malware Config

Signatures

  • Renames multiple (4754) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\658506d33b08221c5d02632f2cd8d46d08a919876df4a69683492192c99771e1.exe
    "C:\Users\Admin\AppData\Local\Temp\658506d33b08221c5d02632f2cd8d46d08a919876df4a69683492192c99771e1.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-701583114-2636601053-947405450-1000\desktop.ini.tmp

    Filesize

    69KB

    MD5

    e649b02ca4367e1797abed499aa847c0

    SHA1

    0ed598bb3e32ea6becfa81e27cad9bc43e9d4ffc

    SHA256

    cec1a205f19f2dc9e8a7f9d84626f9ec9d1a69c1e0068cc0f3c52c8ed8097722

    SHA512

    0d3b8e63faffbc6e417ef135e879c67cb8c1828555fbee141dd6d457ee65acd717d67f8a7c76de6c63d4ce86e0e2cf0e5136bd038e571617ce0f81754e66b6b6

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    168KB

    MD5

    6fe7e398bbe62c7747132e763fcbf2f4

    SHA1

    4c4e89ddd212efc0270488513b64a91a2268c7e0

    SHA256

    cbb76c433a2506b568856403143cef05080dca5d9028317dd9800e36e35c635d

    SHA512

    b5bdbc6cbd715f96bee73eb3cb4d3a91609b8a2ff6dcf3ace61ee319f6bbb300533539d2d2f9124be4d2adc890df6b8e2c57e780b9fe27da7a6e3a0e278a32b8

  • memory/3824-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3824-902-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB