Analysis

  • max time kernel
    119s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/08/2024, 19:14

General

  • Target

    c57486202705c4f488b58ffdf30f9640N.exe

  • Size

    33KB

  • MD5

    c57486202705c4f488b58ffdf30f9640

  • SHA1

    70d5346da68d97a150263c09a28f8b7bb6e85c51

  • SHA256

    5ef44ad16f8ae1cca73f894f44f9b72cc8f3e34194729e624b92053c16c75816

  • SHA512

    df9f25209b2f6c64aede8dd030268a500daa2bb5a8df9c795734aa838b7c6d60e29e3db03a4f77b93e41fa14eb66cffdff512c56eba69b6d91c183c9ae94127b

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcwBcCBcw/tio/ti2b3:CTW7JJ7TTQoQ2

Malware Config

Signatures

  • Renames multiple (4672) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c57486202705c4f488b58ffdf30f9640N.exe
    "C:\Users\Admin\AppData\Local\Temp\c57486202705c4f488b58ffdf30f9640N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2392887640-1187051047-2909758433-1000\desktop.ini.tmp

    Filesize

    34KB

    MD5

    8ba65f1f433998bc961f75c139d980b3

    SHA1

    a0cc863c3194318db9e34c409f89ca254eecf6ed

    SHA256

    a441d75f1b975996f1c9f899c10736d9c95e695d1c15858aa6158e8c8d4e3397

    SHA512

    ea5b6ef861933bafa262f0aefec1395c391d9fa23c7493151561feb4f24d7f46c48ebb0ff5e5955a0de27a67fba6dfa677ec41724d95019db9e24b580d8f2b17

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    132KB

    MD5

    838cacbc373e48d7abdc33b539aee818

    SHA1

    fe664a64c7541ac6d3155998f75c9c464ba15132

    SHA256

    c39202d68ebdb752809ac571141981f0a64666283f84691769da9acc9c95ee02

    SHA512

    732e1ea920420c68ee901e87e7e110018303f31b6f88e6b147bbc50ad2413840ea641ad78e3c64a5ce1dfdb93f2a8f278fcc26d8d795ac38554e3d2dd7a65dea

  • memory/4168-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4168-1220-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB