Analysis

  • max time kernel
    150s
  • max time network
    111s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-08-2024 20:13

General

  • Target

    2fc52d0062af1bd32fa02f90303814da5af454590cc1d119a325d06a42e7a6db.exe

  • Size

    42KB

  • MD5

    d09d1dcaeab425253fff2c9a55ee833f

  • SHA1

    dd0c851a9ae461d1fcdfeec385167320f17078ac

  • SHA256

    2fc52d0062af1bd32fa02f90303814da5af454590cc1d119a325d06a42e7a6db

  • SHA512

    242eb5c9ebf9b7979d79ecf714f87a922e688a5bfad76391dcfa7f3940a223a277479fb2054083817c4b5780cd78540620d6a8413e98ff6b2419fd1f94f2adbf

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATBJpxTR:V7Zf/FAxTWoJJZENTBJ1

Malware Config

Signatures

  • Renames multiple (5322) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2fc52d0062af1bd32fa02f90303814da5af454590cc1d119a325d06a42e7a6db.exe
    "C:\Users\Admin\AppData\Local\Temp\2fc52d0062af1bd32fa02f90303814da5af454590cc1d119a325d06a42e7a6db.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3300

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1302416131-1437503476-2806442725-1000\desktop.ini.tmp

    Filesize

    42KB

    MD5

    3beaee62f60eb232386b325b5bbd9c90

    SHA1

    d2fc8241f734924aaedb1a9d359739fdc393a499

    SHA256

    a7054396f220f72526a9fd18a8b546e34f7bffa6d7919869f2dea134a4facb73

    SHA512

    6da714a8bb2eaf4bc7732b06589bdf83f505d84c1a4a57cafb88adb6a195e044da70176a0460022dd532a156a9c1dc031b16ec4b9434c9b622d3b90669f41f29

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    141KB

    MD5

    9a69e7b6c17f269aabbe44bfabfc4aa4

    SHA1

    be924199be32dd426eb3fd59be47b89dcc4e93b3

    SHA256

    0883428f7fc777bc2cd59479b1b478801fce09f295ec29e7ac44d9f0af0d8ccb

    SHA512

    a32249cb2df80ef7797346a16bb5cb3ee174057589acaed24e6acad81322e3f39952a8ab43f275a4aa1bd74fa46f8e430d2e8da4fa9e45ac4381042f36884b9e

  • memory/3300-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3300-2018-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB