Analysis

  • max time kernel
    119s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-08-2024 12:00

General

  • Target

    8982a7b2b019c913b7722f97bb3a8030N.exe

  • Size

    68KB

  • MD5

    8982a7b2b019c913b7722f97bb3a8030

  • SHA1

    ac9f8c472479486d2e48f0b20270a3a058b66559

  • SHA256

    4a0e54dd35d6a0fb3066f4e843fc93b13f345398318cada4802af1e30ede9cda

  • SHA512

    8b2dfbf190a9f4d0667f492dd92be3e93068f197a930caa58cc5652295a90e73d6119393eb6c05e072e7c98ac10983347b88e152feebd57c673ccc5c08e57d7f

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rA:V7Zf/FAxTWgGpGdQuEzEH

Malware Config

Signatures

  • Renames multiple (4648) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8982a7b2b019c913b7722f97bb3a8030N.exe
    "C:\Users\Admin\AppData\Local\Temp\8982a7b2b019c913b7722f97bb3a8030N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1302416131-1437503476-2806442725-1000\desktop.ini.tmp

    Filesize

    68KB

    MD5

    1ca44e5908c8466e68161d4261b4b15c

    SHA1

    f4a4b88a9a3769bc22a0dececcd18f88a15a032a

    SHA256

    5dfea241e0d596e8abd839f759454b85fdd0fea6656c34455f69a39aadc45f46

    SHA512

    9b86470176f22c7ae25af3b3dad6c5d1d5582d917d2976899db1126c5bbb5571cb5a5541b73f1b2b9a3a3b0b833c983e09b2bd8b2366e89ee573b0b7b445a0bc

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    167KB

    MD5

    68206e9ac61d83a23ea51743d9c24a92

    SHA1

    efdc463c62f74bb1fa8d20d3d153d6ac1f4a8531

    SHA256

    96be655a326204d3c766d24884e4f268e9583b79d24475eb823f691ee5df50b2

    SHA512

    b11414630d68a5d01a09c58873cbd17e9a4f4e739223dc8f274bf3396bc847e2ca444933bbf016fb5d7cbe70fc3d6bb0966c86bc36de7e3a1d6df5c5d60efe54

  • memory/4400-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4400-1954-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB