Analysis

  • max time kernel
    120s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240730-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/08/2024, 09:59

General

  • Target

    8b78a93795c5a40190b335c6e5b17740N.exe

  • Size

    22KB

  • MD5

    8b78a93795c5a40190b335c6e5b17740

  • SHA1

    1d6719ae2d49bc769dd62083eea59bb63df007b3

  • SHA256

    36c4266ac80e7419639eac03ce857274f9b7a01c7dde15b51147d5e3f57a95e6

  • SHA512

    78b349e29da085e0e1fdfc63ed666b495da9a8af87853686e6a9a7622b1b035f38efdf1992e688f1b6d7f432c7eed148150f3957a6b57d02e828bb0d5f385c70

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJcbQbf1Oti1JGBQOOiQJhAT17emDLD0Wd:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJe

Malware Config

Signatures

  • Renames multiple (4697) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b78a93795c5a40190b335c6e5b17740N.exe
    "C:\Users\Admin\AppData\Local\Temp\8b78a93795c5a40190b335c6e5b17740N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4744

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2951562807-3718269429-4208157415-1000\desktop.ini.tmp

          Filesize

          22KB

          MD5

          ab22464fb0faff4baf8b18db1c30da05

          SHA1

          cbd9cd9c7ce7c73cc2f1738bcc3a2adf4aa9c39d

          SHA256

          01cf90c38008de328a78ae13d6af2b0bd5b5e7c6794252341424b9a2cf45cd64

          SHA512

          cf03fa8918057805eee25fa4ad2540b95a09a475cf78255afaa897f6a1b0a53687207fa7718209c6e76694b28fdd945f2b484d6eafdbe1e1aeed8a8157f24ef4

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          121KB

          MD5

          315c7b79b152894b4bcbd92df5d4e1f1

          SHA1

          c31911e3c3eb7c7655ce33b2b8fbeffafc8ea677

          SHA256

          9801e176114d52c5bb02f0e69f9a41b07ea9139d7971615a63f2ed1dc06f32f8

          SHA512

          a088862c779e303e6ecc8b343ba956fe4b13bcbd046e7a63a09395195d08a3da474bbbe36df4e25b7868d3b9c4f297cb68ca039917db8f37003a21fb8101c137

        • memory/4744-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/4744-1224-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB