Analysis

  • max time kernel
    150s
  • max time network
    108s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-07-2024 03:15

General

  • Target

    c77ddd9cf85c0da7e1147a6558b0785ac3f0017f91721d20a148fe04a096a5be.exe

  • Size

    35KB

  • MD5

    241788ee7aacd49f4cdc3f10ec04257d

  • SHA1

    8b6bd9b5fb1cd3abe582a231e412b82dff021579

  • SHA256

    c77ddd9cf85c0da7e1147a6558b0785ac3f0017f91721d20a148fe04a096a5be

  • SHA512

    e8a27e8b94ba6899b6407b511886f513d42ce8662d37bf64fec7baec350b49bb00c71598464fa0cbbe1d723a2000204aef47bd9d45f0bdb17360c3d21fc29c1e

  • SSDEEP

    768:kBT37CPKKdJJTU3U2l4SW7afHFCSW7afHFkK5c5+MN:CTW7JJTU3UFSWu0SWuB6sMN

Malware Config

Signatures

  • Renames multiple (4842) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c77ddd9cf85c0da7e1147a6558b0785ac3f0017f91721d20a148fe04a096a5be.exe
    "C:\Users\Admin\AppData\Local\Temp\c77ddd9cf85c0da7e1147a6558b0785ac3f0017f91721d20a148fe04a096a5be.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-701583114-2636601053-947405450-1000\desktop.ini.tmp

    Filesize

    35KB

    MD5

    1e612560de52a45abe39b96ba80e2d22

    SHA1

    be34f17de48da3752c05b66f87538ba541fa018d

    SHA256

    52f996e9a80f60937deb17b39cdeb28dd9608e852d1a789f5b77078583b3bc12

    SHA512

    6bf673e2c4dd7a5c4d41a3f404cbceb1752a8c4f3c30bb16e5da610c50664bc13987f9dcb228f7dce5988898108f8d0cf491ab18817967a4604f28eff680c6b6

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    134KB

    MD5

    d9242f0e0449ee4faa46d0d24a8f1789

    SHA1

    8763cc53b314d64f4569cd4e1d352c19095da9ef

    SHA256

    801b9c3e9bbe0837717f645de8e185d21b3a0612a58a7da3a21ce0d3f9a07d91

    SHA512

    859ab14dc32dadc480af2bd35a54c55483e7b7d1e685d01694687cf41942644e91c7c026ccb61c86e379abe2f2160493b6d5687f79a87afe345feae89632f617

  • memory/4832-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4832-972-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB