Analysis

  • max time kernel
    149s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/08/2024, 04:56

General

  • Target

    f65f3ec0842dbe878837b5ccd01a0405e3164fbb892b258b6a6a0d6910bbbb3e.exe

  • Size

    54KB

  • MD5

    c8fbfb37ef40385b8bff9167cca54a7e

  • SHA1

    f84ae29f7c3192777bf5c7ec39ad91b25d125915

  • SHA256

    f65f3ec0842dbe878837b5ccd01a0405e3164fbb892b258b6a6a0d6910bbbb3e

  • SHA512

    bfd1f99d47261810784e2e9dbfab0c95ee14c30ee76896d2bacef412056f4315ddbef316a4301e8745017e27005df3f26986930e9ebb34ff972392fa5378d3a9

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATNyIHAJvHAJLMFp:V7Zf/FAxTWoJJZENTNy3p

Malware Config

Signatures

  • Renames multiple (5036) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f65f3ec0842dbe878837b5ccd01a0405e3164fbb892b258b6a6a0d6910bbbb3e.exe
    "C:\Users\Admin\AppData\Local\Temp\f65f3ec0842dbe878837b5ccd01a0405e3164fbb892b258b6a6a0d6910bbbb3e.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2718105630-359604950-2820636825-1000\desktop.ini.tmp

    Filesize

    54KB

    MD5

    46af0ea599224aea3bed47a73b7f7584

    SHA1

    c7b966f1f82cb6f415ee12130c4df3670c9529f5

    SHA256

    b43e49df0b62d11b994ea0626018a951b58c456979bd2abdaf21d545f061e7da

    SHA512

    4b5cb253132ae395ee4bb1b0085f2e30269be2fcd86d5edc09d9e134b9b160f48f0b63eee76cafc66c3957e1c1d6a4f83e8b5d0ccc95fc4f6737752723cd381c

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    153KB

    MD5

    7cb1a19d4971d9825aeb9a390a742ef0

    SHA1

    a1eae390284a6e83816e028dc1f74983aee6d29d

    SHA256

    b9c31df04b7d0ca7e54d49cb6a9fba722473809860e4de35a0d6e4ec3deb54ab

    SHA512

    a8a2751475d4d720307bdecbd463fa7a9674128fdcb12e26cafe134052a76b324e57f34ee00481a04f22cdbea0d065e364b900bb8c8e8cb718e3bf2cc61af4ba

  • memory/2548-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2548-1902-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB