Analysis

  • max time kernel
    150s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-08-2024 02:21

General

  • Target

    c4b615647ae4973fbf1edc0dbfb1bd44e430f05cefeb0ac4ff0a5e957d8c12ec.exe

  • Size

    57KB

  • MD5

    61475ca5ae69257dddb452bc5053a459

  • SHA1

    e8e8a980f9c548ffa60fc6172cbbec511c8daeb1

  • SHA256

    c4b615647ae4973fbf1edc0dbfb1bd44e430f05cefeb0ac4ff0a5e957d8c12ec

  • SHA512

    c93bc7068487e7472cee35c4642ff48fc15283452203839156f13065cdd1947b6cfb57ef0e2dd3ca830d4795a9d48c7e27b7839bac647f1dbf30d1a1a55d9e40

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATNydWK9WKvhmkX:V7Zf/FAxTWoJJZENTNyoKIKQkX

Malware Config

Signatures

  • Renames multiple (5203) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c4b615647ae4973fbf1edc0dbfb1bd44e430f05cefeb0ac4ff0a5e957d8c12ec.exe
    "C:\Users\Admin\AppData\Local\Temp\c4b615647ae4973fbf1edc0dbfb1bd44e430f05cefeb0ac4ff0a5e957d8c12ec.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-656926755-4116854191-210765258-1000\desktop.ini.tmp

    Filesize

    57KB

    MD5

    e6ffcdf3a97c2232d2882bec8a88ac06

    SHA1

    66fd4bd7e4146893d56ba33e842bfcf84ae500db

    SHA256

    15ccd9138805e32638abc00efb369932a6b122d8075c5285b6c747130f0b830e

    SHA512

    08fb2222579e09df72e288f633f06d2d0dd3bb38b75e3a299770414c0aab49efc2ca0d53f09f6e5cd4ae5801a7a87cc0036a6dc6d11e479280b736cc5a1b3b9f

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    156KB

    MD5

    9552357c032ec7a92c530fe3a8d8d1ad

    SHA1

    687db9f5afe53d0774ebf1f2f3138d4b2e2ace13

    SHA256

    508fbe5e5445e9c199b57ddfcdc1c805aaff443608e8f114fa981ea046721b72

    SHA512

    2c00f0b18426708ff0b3efbf944ef2391d1b5d166cd51620281b21d7845301a7d77cca2fbe66f1a89eb36ab4f7a02af8e3867033a749c7ce50541a9044f15728

  • memory/4312-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4312-1972-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB