Analysis

  • max time kernel
    120s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/07/2024, 12:35

General

  • Target

    0b611655749f67fe5a24022cca698ca0N.exe

  • Size

    69KB

  • MD5

    0b611655749f67fe5a24022cca698ca0

  • SHA1

    165239286bcf61dc0c28c35810809ff8b62b8ff7

  • SHA256

    78ddf7de50577f8cda89b50547307155eaad9460317902f268bb5fd9430980db

  • SHA512

    7983209132b13a583a84b47364052c2730682e06864899232ee0804cb35f3de40a18946441560fa66b1c92dc1fa8e2d6a151d3d0fb5ec45133c0e5e6868cfa78

  • SSDEEP

    1536:V7Zf/FAxTWoJJB7LD2I2IpnAMk5rggVe7pdPr:fny1tD33pxk5rggVe7p1r

Malware Config

Signatures

  • Renames multiple (4138) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b611655749f67fe5a24022cca698ca0N.exe
    "C:\Users\Admin\AppData\Local\Temp\0b611655749f67fe5a24022cca698ca0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1336

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2636447293-1148739154-93880854-1000\desktop.ini.tmp

          Filesize

          70KB

          MD5

          bb4f42f92e861445b1cb3b9b9990f689

          SHA1

          113f94887573ddd529e4eaa5013084b2adb1d71b

          SHA256

          97389b1bda7f9e97f9de1d75aa3e123d17a1e16a4e9988bc25f0e24cfabc656c

          SHA512

          8a95be35843311f41902c1913850489c54edf1b418a64f021ff452527a0f75c39791eb2667fad5e8b7c4ef3b3791ea61809cafb986a9af52cfef43bcb4cda2ac

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          169KB

          MD5

          c7d27887348ab168875fcc75aa02caee

          SHA1

          e6a8062158cf75a6050778d6de2b15639f860029

          SHA256

          7dfed93cdfa327fdfc7cc84d1408cbaef9c946c87a10b92a394eab4e8a9c0b21

          SHA512

          46c25e6d704c5286e057cfef2f02fb8086fa5ff86dade92318aa57088159fd04a119fd539e25a1aefb98e239d118f5cf709195f258a3088ce306e4558b4d198a

        • memory/1336-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1336-1646-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB