Analysis

  • max time kernel
    96s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-07-2024 17:31

General

  • Target

    378a82d02ea15f414fa4063fac68e780N.exe

  • Size

    102KB

  • MD5

    378a82d02ea15f414fa4063fac68e780

  • SHA1

    319c42af1b7b41a436fcf2fcd82278e2e46b36f9

  • SHA256

    95668b1e4ddce8f5703e7f85600ab68a00780e875e66c73bba1b3b3483d30a7c

  • SHA512

    b79e88ae4842ffd004baeff2fc3d2d88aaba21fa97efd5bd51c459000b855ac1b955d5ad79c9cb2806432212641c8ed9780ff22590fb71ea2d0d9a3596c3f696

  • SSDEEP

    1536:V7Zf/FAxTWoJJXV6Z5P4xHsthhg/G5ukR+7bHl4vaMPpxIjCTk6G2KZ8qoazwbgi:fny1bHg

Malware Config

Signatures

  • Renames multiple (2582) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\378a82d02ea15f414fa4063fac68e780N.exe
    "C:\Users\Admin\AppData\Local\Temp\378a82d02ea15f414fa4063fac68e780N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1705699165-553239100-4129523827-1000\desktop.ini.tmp

    Filesize

    102KB

    MD5

    82f0c911e61a2ad0d2dc365a98ef5af5

    SHA1

    1930b7bfeddb1f7b4cc32b7022d0d488119b281b

    SHA256

    1d1fac664d30f4c91b0c8237d026b8e626b6ec27d2e056c1f9d4e0cbf1fb7425

    SHA512

    fcd51a32ee08a26dcf22f0f949cc32154539a591a7196e73d6593edd5dff74104fc3a289cb529d667b8b97260d804b3e8e3f9ef6771eb1f775b96669ae4a467b

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    201KB

    MD5

    1b367e84dbe73ab87e8bb3c2bc118a90

    SHA1

    e3529230ccabe69ba57a1a0f4482fde480a524ee

    SHA256

    65283acb4a1935d296168910052ea594ec4315c3c71fe367e4bce0765a02a73f

    SHA512

    e1761c66cc821c170f4a77556a0a694c42a43c0f378f9415fdd28ae88a1bb8a66b1c24537ce140a6d4e49a3c96e0ae5678a4463da621be65deeda38db154ccf1

  • memory/3504-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3504-1682-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB