Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/07/2024, 00:44

General

  • Target

    92d03d2dc35737d50161e7c29e82d462a410349be974f4ebcd120515b3e40ba4.exe

  • Size

    75KB

  • MD5

    86e45fc4adbdf8605acb902190b65552

  • SHA1

    d9b197ccbd61b0805c011b62dddbe44d64f67946

  • SHA256

    92d03d2dc35737d50161e7c29e82d462a410349be974f4ebcd120515b3e40ba4

  • SHA512

    47a6cf8f60363a60d33bd4e59d5b10dd7cd6ee7e0c38429f3732c9fd811241699d6ea79964075bd07d0f970c2ae15ed04ecd734ce5feca73e2427c3ae3cf9e01

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8IZbYU:fnyiQSo7Zn

Malware Config

Signatures

  • Renames multiple (4700) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\92d03d2dc35737d50161e7c29e82d462a410349be974f4ebcd120515b3e40ba4.exe
    "C:\Users\Admin\AppData\Local\Temp\92d03d2dc35737d50161e7c29e82d462a410349be974f4ebcd120515b3e40ba4.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-464762018-485119342-1613148473-1000\desktop.ini.tmp

    Filesize

    75KB

    MD5

    067a4f42f2ddea47ed46f46ed3f4d4a1

    SHA1

    0db182143db68b4f3274ee2f7d18b3e35a460302

    SHA256

    b28ec18ff932e231db3d9eac225b678874c5e2481c19250ec87547e21306e3bc

    SHA512

    b554b57c7651501ccea889a651b727c2e625ac10fd7ff22f56c198212ba4d0ba985b3b8912c14ecc83b66e4b7994fb8c9e4b129c9109d25e929a517db22618b3

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    174KB

    MD5

    bc28d6c92bca894490097318af333c95

    SHA1

    73cc168a829f1283ae4e503993bbc3608e3e8f8a

    SHA256

    b0026daadc121246af52d053e6cffc8afbd4ebf64368ea1ca71656b614e09dfe

    SHA512

    11e85a026b023ddcba93c75118949691d909cb326f4947a60bb7db66442ef2f64b4b325bb0f04fd54a532c3464359cb598acf4b7a365ef43136590f5e025b59b

  • memory/2884-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2884-1686-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB