Analysis

  • max time kernel
    120s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/08/2024, 05:38

General

  • Target

    58bfc053eea9768f44b0c78b8a4ba440N.exe

  • Size

    51KB

  • MD5

    58bfc053eea9768f44b0c78b8a4ba440

  • SHA1

    c5a206ad98f8a27a62ba7ad5521beea85878e80f

  • SHA256

    1b07151ce740f7fa02a690e71a182e4066f9357409fd18d8689ea21f91fa2e03

  • SHA512

    9a6cce74f790bb4d88c663656906f26b6977a701abc306c42a8b7c0794b33ac330e052aa8c7501c2293e22754163cf804f9ae48f4a4b1ff355c260165f3332ad

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATNyHF/MF/6m0mNM:V7Zf/FAxTWoJJZENTNyl2Sm0mNTY

Malware Config

Signatures

  • Renames multiple (4696) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\58bfc053eea9768f44b0c78b8a4ba440N.exe
    "C:\Users\Admin\AppData\Local\Temp\58bfc053eea9768f44b0c78b8a4ba440N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4988

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-523280732-2327480845-3730041215-1000\desktop.ini.tmp

          Filesize

          51KB

          MD5

          d7d4a6a548061fb52e22ece78f842557

          SHA1

          1178979b9249f5275ab3cbdbfb534f1509dbb46f

          SHA256

          7cd4dcfa35b8af4aa71b81752c5f28e9fb3bef9e20d61edb2936884f1bb4723e

          SHA512

          8b6bc3dd990ea1eb1ad79ef14c73aaee64a5e2e1e9d2676f131836918b45a856638f6f0e651bc4e606aa4deb4847de6683b96bf973dd83e1934d7900bea317e5

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          150KB

          MD5

          ed2f60d695dddd858fe1662edcd918fa

          SHA1

          6dbd788cfcc7cfc4f52a74b6a8fde22e8857b5b9

          SHA256

          b285f188a6579020442aea5127a1bafbe3fc3a6544dfcd773702a65a31c14d4b

          SHA512

          1ea0141e8011dcbd26495b5f36812c4b98ade0f5c48ea147d8c2abdaa6a5e57f9dabca23fea654c11f7d3942ae59d413598632ab7b35fbd0ce6591e7670be0c0

        • memory/4988-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/4988-2016-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB