Analysis

  • max time kernel
    119s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/08/2024, 03:03

General

  • Target

    3e465ac04da773a88ef9d92960092540N.exe

  • Size

    32KB

  • MD5

    3e465ac04da773a88ef9d92960092540

  • SHA1

    4d3be85556b85d83d5e4a5bc8da0736b4ff4f226

  • SHA256

    f0723dd1fcbff1ca653426812a63fb8fde5e24660af90cb02b37206024bd94de

  • SHA512

    dfe1f5f3d5485ccfce73cc5f25985c1e42e018d1ca61225054f2e598553fd77552b01ec944362ba03f2171e44b3d57d43cee33641936cd3981e25ca6dfb9509c

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcu90TKe+0TKeIiKxf:CTWJGpG0

Malware Config

Signatures

  • Renames multiple (4650) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e465ac04da773a88ef9d92960092540N.exe
    "C:\Users\Admin\AppData\Local\Temp\3e465ac04da773a88ef9d92960092540N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4548

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-945322488-2060912225-3527527000-1000\desktop.ini.tmp

          Filesize

          32KB

          MD5

          dfdef54a41267687ae9d93cbc0786175

          SHA1

          e76abecbee5348763c23d95776290b80af328350

          SHA256

          f6967125e315063b3e5bc6e249e21a94ca869cd2e31dcc6a2433f4a152207cd3

          SHA512

          a7a8d41cdac603f4a930d75e06a4e08c6a7abe14e5faa070b53d31ca23fb8db56d3dcf11dfdd0587bc270bed26ee09dbe39662d5fba6e307a42e546eb679cb0c

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          131KB

          MD5

          27bce08e2a528ade86df372fe0d0de18

          SHA1

          6a5a1709633db78d05f3b69c11fc02d2c03c8ac6

          SHA256

          a7f1129623a74fce183f865e8706acdf297275581530a2a510c65381b0514849

          SHA512

          9ac059ddca1ba7ff28f6780de2837ab150572aa3415550dd8ed51a315b1f1e9d4704d7de3ae1e0c9cbe795a3651f9211bfee3684e8d0893b6d3cf3c6825f03b9

        • memory/4548-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/4548-1218-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB