Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/08/2024, 19:55

General

  • Target

    2ceb046677d79622e5ea51a5061081110b605640c23daddf4c85b6e4c3c7fc23.exe

  • Size

    98KB

  • MD5

    46bd88b85f7193e8ad4f31a19616efe9

  • SHA1

    c007b5303aa9fcaa0dd19977f862504db643f0c3

  • SHA256

    2ceb046677d79622e5ea51a5061081110b605640c23daddf4c85b6e4c3c7fc23

  • SHA512

    d9cebb75b22f89daddc31b32a19966fee8610e62b1ec31d7b38c6d32f992a9d3b777a27422ac58799a91487f197fe1df51081a0a9353657cdc77b97c297a4cc6

  • SSDEEP

    3072:fnyiQSoJUBM+PocOQejPdMRAHAASnnD5D5172HyZU3YF40S5DnumSFDnDHaJP1B5:KiQSo/V

Malware Config

Signatures

  • Renames multiple (5018) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ceb046677d79622e5ea51a5061081110b605640c23daddf4c85b6e4c3c7fc23.exe
    "C:\Users\Admin\AppData\Local\Temp\2ceb046677d79622e5ea51a5061081110b605640c23daddf4c85b6e4c3c7fc23.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1952

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-4182098368-2521458979-3782681353-1000\desktop.ini.tmp

          Filesize

          98KB

          MD5

          8a75646f11f1aa33c34ffad67c866f6f

          SHA1

          d7fa8840e51c2af22db2bfa660bb0f5dbac41b7b

          SHA256

          e911ae5c935a7b0301c8a0cab0fa386bf9ccc8fbf6b96ebcfdcd04b23b255751

          SHA512

          919d4e01b7614b28de048498d99b09e1df4917faaaceb452e93a406335a5b78901b0e47e91905b9b26c0f251cb23cc538932320ced1a9d8dc71cf6f88f5bd1aa

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          197KB

          MD5

          9e1b2193c65878407a4f436437ced703

          SHA1

          41000c9a793ae25060d210801d1b88ee1a7afd7e

          SHA256

          633a856b85ba0121dc6da2ac46954c0453a56c13bde3765325d76e5b11d5968a

          SHA512

          cb43494400bca3eb2743e4c6ff48f0f24024639f19517097795925aa5e247cfd68a771d81165310afaad37a2559353a9e34973380d4f26db9927299066e016ab

        • memory/1952-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1952-1926-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB