Analysis

  • max time kernel
    149s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-08-2024 03:16

General

  • Target

    def2f6544842b0681d7d9e0c8113bbf37930e49bc285c4ac23dd5a788b665789.exe

  • Size

    61KB

  • MD5

    d4dfde9d7cd93f7763e417f97f24b422

  • SHA1

    c28e952f2a5e80ea32a17719e1d69c093f7b43d2

  • SHA256

    def2f6544842b0681d7d9e0c8113bbf37930e49bc285c4ac23dd5a788b665789

  • SHA512

    d0c05785633b0fa9b380cbf4def98ac8393b75b20e2e9f35e1cc4fdcbbfa9054960196b8a280c914f32ba7fa2c599e1bbef74208c93d5602e8b498ab4e6228c7

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTNyl2Sm0mdnwNSB4QB4h:fny1tE42rnwNSB6

Malware Config

Signatures

  • Renames multiple (5200) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\def2f6544842b0681d7d9e0c8113bbf37930e49bc285c4ac23dd5a788b665789.exe
    "C:\Users\Admin\AppData\Local\Temp\def2f6544842b0681d7d9e0c8113bbf37930e49bc285c4ac23dd5a788b665789.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:444

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4182098368-2521458979-3782681353-1000\desktop.ini.tmp

    Filesize

    61KB

    MD5

    eec73190bf48e6cd6b3fa96e5b289a32

    SHA1

    62c0d2233f6baff8f257471ba7253ff9f32beebd

    SHA256

    3166b619c4798759f85035f6b7a21fe3e676353228c687bc9caeb0fd8ac4bce2

    SHA512

    b4cda220f4b2c32190dcd5c2be743a5e5fb48aef668f1a356f1c836bf363e240d4934d943e2275628ea815708c26e64c48160d3da03239ed97fad43296c5d754

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    160KB

    MD5

    2783e33a83359b3f3c0966f5336ed9c7

    SHA1

    72f73ba05be88c5661a4e6efaf12a3f3c7ec7801

    SHA256

    f723308256a7bb5f0929d91cb40a7c68c64fb75aa4ec4406967f85987a85c780

    SHA512

    6d878be08c821666ee048bbdaab581581d902b4621bb69b66288da5560c31d43cc42587270d52dfb77b0dea3df55a36ed891da7d67bb2ca4a125268650a39a86

  • memory/444-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/444-1958-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB