Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/07/2024, 00:39

General

  • Target

    8f4f361b080c416170010d85f27047087cf1c1342cbc657189676439c7019c31.exe

  • Size

    102KB

  • MD5

    cf296d68224dad5c6bc578f9074d2add

  • SHA1

    e3b2e1425abdc549334de98ac44b35ed548509d7

  • SHA256

    8f4f361b080c416170010d85f27047087cf1c1342cbc657189676439c7019c31

  • SHA512

    ce2aa422438f60ac0258f5da03104ce631c1d76a51bff31ff4ebb9fc8d04489afa7215e8fbcdbfadbd9de1987d5a09a3c9f87d673a04046ec51debee66d495a6

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8OySUX2R2W45P2:fnyiQSonySUX2R2W

Malware Config

Signatures

  • Renames multiple (4617) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f4f361b080c416170010d85f27047087cf1c1342cbc657189676439c7019c31.exe
    "C:\Users\Admin\AppData\Local\Temp\8f4f361b080c416170010d85f27047087cf1c1342cbc657189676439c7019c31.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1176886754-713327781-2233697964-1000\desktop.ini.tmp

    Filesize

    102KB

    MD5

    b74960c7d3b77dab1a47a390d3b5ef62

    SHA1

    746e26dcf4f6f1709e06cd628d8e512b186ee709

    SHA256

    5be8993b5bd87a74d8d26e2691ee3bf2fc65d0c8d0215f556998a2a0e2c5c21d

    SHA512

    db7b055d7a26eb88d83c338bf265bbdeecfc40b52a11490f63e94654a82619bdc996fe71ad6c8b2b5fdae355b4c1abbe846491c4c71135df4d63c378e8bc9985

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    201KB

    MD5

    7de28c4ca6a4536f5de53f4b5c4f6d05

    SHA1

    9014e5def402b25c9a958538f5032befbf9f2fd5

    SHA256

    d1701bbcfc8b8d26e410b77630835551366a223ece15e68a46ab807904199253

    SHA512

    7197c27719436c6548ff9e61a41ced1cf2cce290139b61887d653e8db2639f9b5dea922eeb06591aab9b36f773baf598ca1b523416cee873ca99a69afdd99316

  • memory/2016-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2016-1682-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB