Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-07-2024 05:38

General

  • Target

    ef13a2764d5bda00914d81302c97f304a71518feb20523c18660ca3160eedabc.exe

  • Size

    50KB

  • MD5

    bdf2168c6fd15c38a1c2ceec48edf560

  • SHA1

    5527eaa6a52d179c7ce1aab6dfdacdcdc339419e

  • SHA256

    ef13a2764d5bda00914d81302c97f304a71518feb20523c18660ca3160eedabc

  • SHA512

    79ac555fabfd747e458fb1b08c9f18ec4ba653c7047144758cced7b83bd8835e0b5bf72b602d31b92669a29bf3cfdc87af45189a1d04f6ae39b4452543326820

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcuX9km9k/fxRfxykf:CTW8OmO/fxRfxykK3ZUkK3ZKYn

Malware Config

Signatures

  • Renames multiple (3973) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef13a2764d5bda00914d81302c97f304a71518feb20523c18660ca3160eedabc.exe
    "C:\Users\Admin\AppData\Local\Temp\ef13a2764d5bda00914d81302c97f304a71518feb20523c18660ca3160eedabc.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-384068567-2943195810-3631207890-1000\desktop.ini.tmp

    Filesize

    50KB

    MD5

    2de4d8e40f6699c2467f44798eb15b57

    SHA1

    000ef09ff4b7a80ab3bfe9a4f2173015508ef030

    SHA256

    1deb8ae6ca2febf9b6b8893f9460df9df127f6cb6568f9366ce0d979065bf11b

    SHA512

    d673a8f184936b6f3b123aeaeb34c50a690f3380612473296e56ab2781c210e09582f710d0aced77c55c7b53a90ab746cac391055bc672e1a2b6bc22ed0926ca

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    149KB

    MD5

    b4ba1f72e0b95bd132877ff338b0980b

    SHA1

    9594426f31c29066e1934fee3f9785ce66cebacf

    SHA256

    54fc42413fbb4f108de2cee43f4e73b7c4788856427f43c5f8296997d881da40

    SHA512

    fa0964afd93c1526253e2ade4a3a6ab6aa24032a4cbc0dcb9178856cf7076681cfa68cf5ce0f8a8cc6c833855ced36b472d8b3c8a03e85e6d41511030b082648

  • memory/2820-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2820-454-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB