Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-08-2024 20:00

General

  • Target

    277e752f255d480c59445dccd8616037efc75ddd4a1f79091f70c805df393bb0.exe

  • Size

    62KB

  • MD5

    81c69b5c0bd219907b3bd58cec35bb1f

  • SHA1

    f13fd493f74aa3b488dae7bcf662eb30f67c6cd2

  • SHA256

    277e752f255d480c59445dccd8616037efc75ddd4a1f79091f70c805df393bb0

  • SHA512

    a7891edc4885360a1c996cf003545b7876d5a7ff1a7113aecb3695b113fb6dc0dd8e3494c0e94cac595c839a6944585fa29dfdc5cd4f237fc0c0ece739387ada

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rl:V7Zf/FAxTWtnMdyGdyr

Malware Config

Signatures

  • Renames multiple (5191) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\277e752f255d480c59445dccd8616037efc75ddd4a1f79091f70c805df393bb0.exe
    "C:\Users\Admin\AppData\Local\Temp\277e752f255d480c59445dccd8616037efc75ddd4a1f79091f70c805df393bb0.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1194130065-3471212556-1656947724-1000\desktop.ini.tmp

    Filesize

    62KB

    MD5

    49757c8d88035ba860c93e91728d05e7

    SHA1

    ba952d97fb4abf47967881b7b344b0a75cb185ce

    SHA256

    1fae68bda9c083ec3db97bc77f7bfcf2b57fa473c06d78ca4f7ba66e817bc65c

    SHA512

    c7b86860e9db08c7aff6f377cd7c62876be24e5f1a08f31d6cb3460da740490130af6b5452f43c1f0f1168aa50a2327871fa521268739088e36cc0a8c7f7c1f7

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    161KB

    MD5

    83b44be82a19a282a452b400584f59d4

    SHA1

    681ea5316fa1ad2090aa435a6a508db2334f7047

    SHA256

    76648775b925b30be3b2b76276a3432f0bb4f50bb7de38d4a9b2b4e884144277

    SHA512

    98febf64676e1f2c3262d4f9d7c42291bc9de784407a27d47df52673a7648712aa628debd7c9a572e4fcff9c3872c374be2d457ed73486cdcdd32d559fdad37b

  • memory/4312-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4312-1958-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB