Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-08-2024 20:12

General

  • Target

    347e5a5953aab8e8af57f721dccd23760db18988efb2c2b04ab1b94a0d178861.exe

  • Size

    69KB

  • MD5

    a8d8a21a91fecde2e6a2841d869f2d06

  • SHA1

    f8b929262294cd85c1fa6813ccb31a4c132fe379

  • SHA256

    347e5a5953aab8e8af57f721dccd23760db18988efb2c2b04ab1b94a0d178861

  • SHA512

    cd3981d6bc381c51e12b271140478c1fc60d8fae0c4b91c7c30ae6ac8fc98b285b27410c20346e62268dd9ac1bec4f29afc43b01e326b402eb27057e635852ec

  • SSDEEP

    1536:a7ZyqaFAxTWH1++PJHJXA/OsIZfzc3/Q8Q8/8fCI:enaypQSoskz

Malware Config

Signatures

  • Renames multiple (5077) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\347e5a5953aab8e8af57f721dccd23760db18988efb2c2b04ab1b94a0d178861.exe
    "C:\Users\Admin\AppData\Local\Temp\347e5a5953aab8e8af57f721dccd23760db18988efb2c2b04ab1b94a0d178861.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2718105630-359604950-2820636825-1000\desktop.ini.tmp

    Filesize

    69KB

    MD5

    cf9c18988407eee9df59b411cc246348

    SHA1

    eadf315df6e4152e953417f8fb4379df664aff2e

    SHA256

    a1c1593761e09400dddc531ee81dd11f45c9c26b0863b413a0b82ef319b4b5a0

    SHA512

    c8187c9c4768d923373e7f03c1825c803676e6ce78d39f4c038dc73eed60ef07b4041de4782f0686b7bf149854c4a8d91284ad825ae0b5a423a14c39ff9d562f

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    168KB

    MD5

    f767f39170bc2ed3734780412af2081d

    SHA1

    7144f7c3fa64d4205fb80e0d64ca07418c4bc0bf

    SHA256

    0dc3cd41b0449b23b095c7b107a02789f5b71ebf63283a3184ca26f428e9cf98

    SHA512

    ab55d25a3580d2d58192b1ffdc8290e832ab2e2f1a21732d7a5575d25da5e04c60896e7b561b8d9769cd2ff9856a32186b5366b9e6dfacf797f3f77bff6d4612

  • memory/2172-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2172-1900-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB