Analysis

  • max time kernel
    119s
  • max time network
    117s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/07/2024, 11:42

General

  • Target

    bf2714538604df92de5a2812031840e0N.exe

  • Size

    46KB

  • MD5

    bf2714538604df92de5a2812031840e0

  • SHA1

    c587e18d24e43d0926fa0c77e120d2ff8659a410

  • SHA256

    e0ae9d23a93b8a4dcb8bc9732d2eb6fb159274a710f6be90a8b7a4a37efa129d

  • SHA512

    46a7c4dd8e4a14b3c521b915dc66c1e2190d3073359207cedfaeb3932e6e9349272bb14fe439ee730300b71a5b1b24855b7f3a9f226d9debb3ab33e9292ffc47

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcwBcCBcq:V7Zf/FAxTWoJJ7Tt

Malware Config

Signatures

  • Renames multiple (2301) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bf2714538604df92de5a2812031840e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\bf2714538604df92de5a2812031840e0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1984

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-384068567-2943195810-3631207890-1000\desktop.ini.tmp

          Filesize

          46KB

          MD5

          e97b76b64b1c10ffbd63dc35dc9d2f6d

          SHA1

          b17eca3c9a0ef0d7978fb4dc137a5bcab0b44308

          SHA256

          2105bcbf7446ddf5e31574af2872b011fe426ceafa719e46e666889833d155fa

          SHA512

          bf5bff1e391b6f9e2aff73b2a3d942dc2a0a3a4eb10ad004265b26b40b20de1b1e67824d962f1942d182f081b55537491d88fb9203a9087a79a2d0e9278b8505

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          145KB

          MD5

          0b77e7f6eb3eba30b631faec44995ef1

          SHA1

          ede33fc977a9d19cec3172459a3d11dc675601c3

          SHA256

          066da27de38741af6a00d990f866d7f08c9514c88327c5423ffbb35cb130310f

          SHA512

          4ca4a92e4acdcee0a9066762b8762b2ed78348ea077aeab01486aacbeac7eb43aaede61150ac6010987b8ec2f4a0aba5c522b3e7c175e90f0533a66013e480f6

        • memory/1984-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1984-1297-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB