Analysis

  • max time kernel
    149s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/08/2024, 20:09

General

  • Target

    336691208535ef3b589f9293714312b0677a5aa38b0e1df80aec7b9e69521abd.exe

  • Size

    167KB

  • MD5

    81af277dd0ab225b18859c63561a1eb4

  • SHA1

    dd897b513a2be9e61b55f6ed2017883927b9662e

  • SHA256

    336691208535ef3b589f9293714312b0677a5aa38b0e1df80aec7b9e69521abd

  • SHA512

    16c3b18078c25ce089447cc89cd8f0f802d0dcd45d124256755a96e4654fc9c3aa98c7533ad02dfa7a7b251035599e5bbe3bda4986472fc2b0bfa4f2df795ad6

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8IZf2XcqvcY2gjsTn7fpXpgmvzOdSrnvz:fnyiQSo7Zf2XkQsTLpXYSrnvOZxk

Malware Config

Signatures

  • Renames multiple (4814) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\336691208535ef3b589f9293714312b0677a5aa38b0e1df80aec7b9e69521abd.exe
    "C:\Users\Admin\AppData\Local\Temp\336691208535ef3b589f9293714312b0677a5aa38b0e1df80aec7b9e69521abd.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2104

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-656926755-4116854191-210765258-1000\desktop.ini.tmp

          Filesize

          168KB

          MD5

          8ba5653797decc3ba8e9283a9d6280f5

          SHA1

          87f024d9c05b928a5eed75e98b201ab3775910b0

          SHA256

          5b0b5b0240fd048b55d31c6d25952abb09f313ceb78be232b2e0a085cc8acff4

          SHA512

          1353c81061492a7be923768827e6a1a5b12541a6814ee2aa125df29452fa473e4e8220ae7bda7b6f7aae3242a1ec6bcc06e91929030f25b6ab844754e8de0d42

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          266KB

          MD5

          f60ff4ec7b836380708f4d7050d57f8a

          SHA1

          4c17adf76c9b3e44cd7f59e7d6a454913643b073

          SHA256

          d800b0c783fb460f3f640a5b94ae185c02e67cc8edb3f699ab1d48e9bf3550aa

          SHA512

          f766a4a5bc0ce64904dd31e51ddd158673c668ce8e660d44eac541c273d9d853584c57f4baedd20f5818fd76817fb75ecd3deeea8621754ff56db7d90a125199

        • memory/2104-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2104-1762-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB