Analysis

  • max time kernel
    120s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-07-2024 09:37

General

  • Target

    b09bb3795701ed83d4b4e3c925d21cc0N.exe

  • Size

    146KB

  • MD5

    b09bb3795701ed83d4b4e3c925d21cc0

  • SHA1

    bd81d8be11814bb676e520ac55a1fd4c59abd42a

  • SHA256

    75ac50dea422e3eb59804b5322f2a83962eced0330577abf0d3e1a765b53e1fe

  • SHA512

    ae90383a3e91ca07c155392985f39d869a25e79fd83df77630734133edf2a2d34c14e603f91c734c114236e23e0b1ec9584515ae1abc109ef6c54547f94b586c

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTNyl2aP7kLfQOVvZQh2bAFq:fny1tE42PVw2EFq

Malware Config

Signatures

  • Renames multiple (1325) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b09bb3795701ed83d4b4e3c925d21cc0N.exe
    "C:\Users\Admin\AppData\Local\Temp\b09bb3795701ed83d4b4e3c925d21cc0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2636447293-1148739154-93880854-1000\desktop.ini.tmp

    Filesize

    146KB

    MD5

    af4b2119df307e4b978a498e511441d3

    SHA1

    5e2a886731e8b4655b5f4ba563148fb9adb3b1d1

    SHA256

    870cef5c1c5716795cb11a25f0abf36b935e7982a2222da985e3410953a2a9ad

    SHA512

    85158a1f8e519015434cc971b4c2ca94bb269af03be38d02ce7509c27fa909f14aa51736c37e1ae01207a3b3233bb387c976e999a0d903677d3076b684532b26

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    245KB

    MD5

    53b684e2b9a6618bbf2c5010c8bfe3f3

    SHA1

    2ee6eb793614db5654d56b645a5ff9ffc1e9ce30

    SHA256

    337b6119d2f226e7c066e391241eff27d1d0c331b476bdf8aa52aaab7ded885c

    SHA512

    33264976ce23935173689bc92f47338f24f374cb5a47bc43824bf2ca95c1516a49ac84fa539b9102cfe364c452475b90fe24787c566263b286727e78a12bc332

  • memory/2908-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2908-802-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB