Analysis

  • max time kernel
    120s
  • max time network
    113s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/07/2024, 20:31

General

  • Target

    5128e3f78540662614235993e2c3a320N.exe

  • Size

    24KB

  • MD5

    5128e3f78540662614235993e2c3a320

  • SHA1

    1bf85c34d046d4ab32ed6a3daa144d4216574c46

  • SHA256

    5f3619290f74b691079963ad87e3f81e2b5d1b28b4d7853bf75af1464ab30724

  • SHA512

    3f6c63d41b2a898871b3f0b4b936330452f9a5c874f4a0540eb0cfdec12263bae61f928d926e91cb244940b840c79c1798aa03fcf0a1c9b3615506be9b92be51

  • SSDEEP

    768:kBT37CPKKdJJBZBZaOAOIB3jM2jM7lKsr:CTW7JJB7LD2I2Iosr

Malware Config

Signatures

  • Renames multiple (4224) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5128e3f78540662614235993e2c3a320N.exe
    "C:\Users\Admin\AppData\Local\Temp\5128e3f78540662614235993e2c3a320N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1403246978-718555486-3105247137-1000\desktop.ini.tmp

    Filesize

    24KB

    MD5

    21f6b7506ccbe01c64da000ec4ac680b

    SHA1

    3915dcf7894175f532fdab345cee17d7d890d17a

    SHA256

    57e5bdfeb18a148b0f22882483bf910066e398dac0055a318ce67cb352eda2e3

    SHA512

    6b96334b335d9d7523aa3c2e25a14dc588ad9837039219fc4728a66bd6fc91f48706c46c63d9e6a20e3342139e08a9513b1efb2ecb43cb962d9495830dd22fb4

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    123KB

    MD5

    6174902450809a1874e55b1dfd903abf

    SHA1

    c1f564831572b0a911034742c34c99f93822209c

    SHA256

    5cc71d15359ae40325e4a228d185b7089fc9ff1ff7a002f220b84bb69cb710ec

    SHA512

    72dcead87c46d3220f30b39fb3b26dc344685863bb741a6163cafb44865f21866a53bc7dfa25c8ad19cb018faa8414955505e18c873cd5e2015d76705c0befa0

  • memory/920-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/920-714-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB