Analysis

  • max time kernel
    120s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240730-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-08-2024 21:27

General

  • Target

    04f34b3e57a09cb96465058c61cea9e0N.exe

  • Size

    60KB

  • MD5

    04f34b3e57a09cb96465058c61cea9e0

  • SHA1

    8b300fbf8db04e8c9a240bb84de816dfd9d9d1a3

  • SHA256

    2182ba27515f64c2322d33f7bb1f6388a54e832741958a669467f9c0ab19a179

  • SHA512

    f4c2d8f6458f4bec28392d53c885fc06553b5d22d51353f6d5a08933266195a141ce6d5be2fb119d8094ebddabac073d58caf5149eec5769e397afc4fd028c05

  • SSDEEP

    1536:V7Zf/FAxTWoJJB7LD2I2IGBq6nnrsDjXHeMchMiic:fny1tD33GBq6nnYDj3eMchMiic

Malware Config

Signatures

  • Renames multiple (4661) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\04f34b3e57a09cb96465058c61cea9e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\04f34b3e57a09cb96465058c61cea9e0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2077438316-259605770-1264560426-1000\desktop.ini.tmp

    Filesize

    60KB

    MD5

    9be6f67bacadfc9c18db9c01af377f4e

    SHA1

    3e09f08c8d25d087b4b58283e3d20c312853bb97

    SHA256

    bb859201560c6bb0a96a4b534e19f492d366ea41b991d6fe5d73f41cdefaccc5

    SHA512

    4cbe6a1f6075071cfa6256ed724760eb1b3618eb9ecbd7dd805d770d20f5c971d81621ef14776b88ec49ff746151c9b71894303ab337c7c4ac0fb791fd97e31b

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    159KB

    MD5

    f80c4c6a1d4d80d39f5424f7a1aa8ca5

    SHA1

    d5736d4d848f4e85561f5190e35457e3cb6cfc8f

    SHA256

    29551bab6e8ef30cee85d49728637049df813d1ce7c60b938451b1c8fafd35e2

    SHA512

    25b58b34ba3cc8dac21aaaabba05fcb5b6ce572b93efbff5721ccb0c3033c3ee4ea2a742fdf16686780295018a80a4d9b5676867a29e45dd8e0effee5a7246c4

  • memory/4812-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4812-1956-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB