Analysis

  • max time kernel
    120s
  • max time network
    108s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/07/2024, 19:50

General

  • Target

    4b72c7668dea16db6a9278be168acfa0N.exe

  • Size

    19KB

  • MD5

    4b72c7668dea16db6a9278be168acfa0

  • SHA1

    483c5d2636a74925a74dfd6f74cb1816b85ac9e5

  • SHA256

    db61ddf79393e06191efe3d4893c97d9e0f2c92632f2fe50ad7667ca9e7d65d7

  • SHA512

    8fd46dd1d3f931505673b5b2a826ba48bee9e3249d122b5158902da3a30161e39ab0851f1f243860da430cbfb7ad1c86714d12d1e8793e4e621ca3d96559c815

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJcv9c34UD+34UDnVun:kBT37CPKKdJJcu34N34mVun

Malware Config

Signatures

  • Renames multiple (4164) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b72c7668dea16db6a9278be168acfa0N.exe
    "C:\Users\Admin\AppData\Local\Temp\4b72c7668dea16db6a9278be168acfa0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4480

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1176886754-713327781-2233697964-1000\desktop.ini.tmp

          Filesize

          20KB

          MD5

          4b44631bd99ca0d9fc324dd29d014657

          SHA1

          25c4464f3443701922a37fbec872b2172e23be6d

          SHA256

          a6df211d6bb319e918ec33c21e46fb00614de6fd867ad36c2d4f26488c5d21f1

          SHA512

          6a4cb6f8f8222a5c61d015488cde5755f5363e6e8919f4df6d83b081afe64a44f38df82493d77b56a25c596553a50b70c9fc29aa5b454782b3cd4fd500f57af5

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          118KB

          MD5

          09333ad0fe0580acea3a4bc76229f690

          SHA1

          e2867d9bf024983153f5388b5cb71d113be307af

          SHA256

          5415bccf1d0a74b17d62df045eda132326f3390c3602aece9a4addd851fe9d74

          SHA512

          d3afbebf718620256299bd3d1f1a60237151ebcf49c7e49f96ac8fe0e3b35e1517471bcb9bf13d0fd738dc779c1b4defc9bb9822c643f3fe38e970ec08c0d60b

        • memory/4480-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/4480-866-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB