Analysis

  • max time kernel
    120s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/07/2024, 18:28

General

  • Target

    3eeeb84b9224cd32cca7ff057c544120N.exe

  • Size

    26KB

  • MD5

    3eeeb84b9224cd32cca7ff057c544120

  • SHA1

    446a21fc62cbb432a554278d1d132e0926bd4a70

  • SHA256

    3e52c87947510d94cad2eb3328ed2f60be66ad8f01ae58b99d10f486462f98dc

  • SHA512

    f73393b2fffa307556a237f621b6589a2b8e8293c9b920d826f81034c443556a7ef6e3e30961f991f5f46771a950782996fc7142e21f142cc7b4f6c45e5e807d

  • SSDEEP

    768:kBT37CPKKdJJTU3U2la3F53F5BLwau6tLwau6V:CTW7JJTU3URz59w2wA

Malware Config

Signatures

  • Renames multiple (2187) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3eeeb84b9224cd32cca7ff057c544120N.exe
    "C:\Users\Admin\AppData\Local\Temp\3eeeb84b9224cd32cca7ff057c544120N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2636447293-1148739154-93880854-1000\desktop.ini.tmp

    Filesize

    26KB

    MD5

    e1a758fdfef2c25550be9841ddeede98

    SHA1

    b54fdf7f4d71c8230ba9dd0914b2b5b4f3e04a49

    SHA256

    8e72583a06920fe1e7fc257589de208d2aeaafbef3eaed89d7efce0552a00dd7

    SHA512

    9ff65c0292277b3704c10cb729aeeed8596d4933d5a3290d143e7906a431444992f9a6b27bb07e6ead72a7c66de9e1f854563b3d1d22b777f9806faf0f465cb7

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    125KB

    MD5

    1bebafa870dc809c3c5f6c458d0cc016

    SHA1

    bc7511490a98a56bfe85ea794e88d867051bc098

    SHA256

    7bad9c3cbd14f07547d728abc257f0eb9a52f7f866df8c66fa8a6c7643e867a7

    SHA512

    8ca08e68c4a283d6b596f1388ba46408544458459c27d9a8e770fe7a8509bd10c6a1cd38d28e15dbad42f2ec619712486f6bcd9ebf7b4ba2eb279d2a203584c0

  • memory/2196-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2196-322-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB