Analysis

  • max time kernel
    150s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-08-2024 23:05

General

  • Target

    769abfd4d1b5115a61064e7b3035ca59f9f1537629874c26d758848edc72bee4.exe

  • Size

    30KB

  • MD5

    fd21349409a48d0438dadf0186537cb3

  • SHA1

    28da9eb146fe77ed708a7cac5af985021858b6ef

  • SHA256

    769abfd4d1b5115a61064e7b3035ca59f9f1537629874c26d758848edc72bee4

  • SHA512

    c831b0e1bc0b6c5aa95eaed0a64b06722641501d98ec7fe3d8573a59391d1e14e54303e2801295ba0ceaa5f4cd1d315b432222b463c7ac687bd7bce1c311887c

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcu90TKe+0TKerwFNn:CTWgDF

Malware Config

Signatures

  • Renames multiple (5247) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\769abfd4d1b5115a61064e7b3035ca59f9f1537629874c26d758848edc72bee4.exe
    "C:\Users\Admin\AppData\Local\Temp\769abfd4d1b5115a61064e7b3035ca59f9f1537629874c26d758848edc72bee4.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-523280732-2327480845-3730041215-1000\desktop.ini.tmp

    Filesize

    30KB

    MD5

    547c6f3f1935a8a1dda872f590695d02

    SHA1

    a7e15ff83f523885072ca9325e7d2d382cdfccad

    SHA256

    b5b6658889ee80a9c67eec46830b8d66a0c9db3e1b56cbda0e78c6e6f7392ce6

    SHA512

    9f385455daa21cbeece513549b394539de3cfa2d8989b7496b90a367bb490336d4b48488db9c7c1fbad3cc5f9a065af7cf74d18221502a3e8f8af58074397c84

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    129KB

    MD5

    898646c754425af1008eecc5eb66e839

    SHA1

    b13865648554089cfe0507c2c0f2166634ef16de

    SHA256

    7b6fe564b28a776416f3220476fb52238056fb9853377da9e9628594e6635b79

    SHA512

    9a97f54154a3950d6e94c80a0618d2a626e21f6ecd0d4d40d20056dc1f8ee42e5ff00d7bfcf93412a9108b260d9da5d93f3e79f7b52ac9f3a30bdef31e115c3c

  • memory/4856-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4856-1230-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB