Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/08/2024, 23:48

General

  • Target

    88c0e6557fa75647a70da088ceb756128970f6e2f465b16dad5b41a84a1e1782.exe

  • Size

    64KB

  • MD5

    48b52722c6ec12501ae5a7c950a81a93

  • SHA1

    8bf2cf2cf15140f260eee8cdd26ae398cb7389ff

  • SHA256

    88c0e6557fa75647a70da088ceb756128970f6e2f465b16dad5b41a84a1e1782

  • SHA512

    cbf91ac360cc3eb190ef580dccc7e13f40d3fa5f7b22bb574986fdbc417e9cfb6e3ed779ac3d549d0043687c0c21e38ac353ff507345b8f49748175ae070c57c

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcwBcCBcw/tio/tiyqAbJEqU:V7Zf/FAxTWoJJ7TTQoQTF

Malware Config

Signatures

  • Renames multiple (5126) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\88c0e6557fa75647a70da088ceb756128970f6e2f465b16dad5b41a84a1e1782.exe
    "C:\Users\Admin\AppData\Local\Temp\88c0e6557fa75647a70da088ceb756128970f6e2f465b16dad5b41a84a1e1782.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2724

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2718105630-359604950-2820636825-1000\desktop.ini.tmp

          Filesize

          64KB

          MD5

          9898bedca73a4a7011440f5ae429886a

          SHA1

          60e5fb64272c0aefd13fe24df67b2d5e5b34b4f4

          SHA256

          c494186109f9aae073ed89f9c84e70702754511b100c6b55a700cf763d51463e

          SHA512

          c3405cd5a75c3ab2444ad6aee32e061eb4a2341ff768e92e499280b51e6e458a86fbdd301fbaee2b5969025efc34a685728f4225b118d6af6efc75085b9b6860

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          163KB

          MD5

          52ca61f4f8a8b2fd4c43ac44544e534c

          SHA1

          a7451b5cee3c85a42dacff864b275d53942883a4

          SHA256

          6ae4186e8c992021f3fb5e5f0a15ebd019a0449bfc13314fe36cd4124429f586

          SHA512

          b4cb01379b59a267fd28496334afff44cebc9b0f04fc21c6653926f98d94aa22dbdea8f04c53f14ba041674b903a63d557f96e448edd6dc0f46d2b9f19add5dd

        • memory/2724-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2724-1950-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB