Analysis

  • max time kernel
    150s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-07-2024 05:44

General

  • Target

    f0ed5bbca6a4f30865372d29dea92ffa9076739fccc6e2cfc8dcd7dba3a991bf.exe

  • Size

    51KB

  • MD5

    765717f75b65d5210373f50fd41b47d7

  • SHA1

    9aa4b81132872fd320dfda8d7c1a430c8b9f7d7c

  • SHA256

    f0ed5bbca6a4f30865372d29dea92ffa9076739fccc6e2cfc8dcd7dba3a991bf

  • SHA512

    446f339da205f6959177bc4b86ea9a200f333e8383697b021479e3f8324895682d5231a2a86190234e25416d58e7731dce4f8c0b8ebac8f351148564014e063d

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcmTfq9Tfql:V7Zf/FAxTWoJJ7TB2c

Malware Config

Signatures

  • Renames multiple (2167) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f0ed5bbca6a4f30865372d29dea92ffa9076739fccc6e2cfc8dcd7dba3a991bf.exe
    "C:\Users\Admin\AppData\Local\Temp\f0ed5bbca6a4f30865372d29dea92ffa9076739fccc6e2cfc8dcd7dba3a991bf.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2990742725-2267136959-192470804-1000\desktop.ini.tmp

    Filesize

    51KB

    MD5

    486000f583ceea38404a927daf279673

    SHA1

    d3a8731bd5d63f16f95b6080c19c65e1380d9df5

    SHA256

    5bf663348ef8d8063d796779fb70c0bfdd0a50ace1fcc071187ab083dfd50a84

    SHA512

    da92c94fc7aee3946fb7f67ace7469d255d2d60ba706a723202edf8c0f0c8ad9208727732184d5bfd6c6b23095d1a46ed47d19e01c572ed4fff8e9bfab3838b4

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    150KB

    MD5

    fedadf8c3d3f75e99dfab72a34426dae

    SHA1

    d5daa59612828f14f0979dc45cde3ac9c1596f60

    SHA256

    0a7312cebbc85206b85d107efd1a2d572a7cfd66afa1920651dfb948f48fc53a

    SHA512

    237c712cd6e502b439f7422250361222d65f864e636cf878e8eb8e28e037b49711ce6591dff9d350d755e59f6541f6b49b64e9dcad2d8451ab0682cc6693ec00

  • memory/3448-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3448-1076-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB