Analysis

  • max time kernel
    150s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/08/2024, 01:05

General

  • Target

    ae2ce79dca56ab395127624c4f717e05188223685910ccbb78c852772c7944da.exe

  • Size

    29KB

  • MD5

    9a5aefd184c6d3320ec6dcb624248fad

  • SHA1

    227d74ab378ce146c3503493e301554976a01285

  • SHA256

    ae2ce79dca56ab395127624c4f717e05188223685910ccbb78c852772c7944da

  • SHA512

    d2875ce131cf9c71306800a044f0c95f0a10e164d6f19bb83e1d8a7a81d90f816fee4fc984c81e76b6b3d94afafce81ee8f594dbb810c56702409f8404a46c1b

  • SSDEEP

    768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATNydWK9WKsl:CTW7JJZENTNyoKIKU

Malware Config

Signatures

  • Renames multiple (5329) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae2ce79dca56ab395127624c4f717e05188223685910ccbb78c852772c7944da.exe
    "C:\Users\Admin\AppData\Local\Temp\ae2ce79dca56ab395127624c4f717e05188223685910ccbb78c852772c7944da.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2292

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-523280732-2327480845-3730041215-1000\desktop.ini.tmp

          Filesize

          29KB

          MD5

          d7c7fe0484453a052ac669bde24c5207

          SHA1

          a014015e2da5d4b68ba933d6bbb22595783741d4

          SHA256

          912f082f08a6376527eb6ee345b26780c2d0f3dff2380c38fc00de98f800bbc8

          SHA512

          277af248370fa69d25e579f854248a5125bd5569806d7558790d5adb6ddcbec8d5fb58ba87d5e69aecb603286186a94c6c2862e2342ef4718815e9dcfbbb4bb7

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          128KB

          MD5

          6da18b642c7813a26e97008fe4d96a85

          SHA1

          68aa2323bbfc87f5ad0766172cb84477e6808d3a

          SHA256

          5d8dc39f4a6d9e86d2bd55269a9f0a74c3ef167742c073c0c9b07973d9ff35b2

          SHA512

          b2e7beeffcf3d7f0d4a0cda7eabb959f29d8058f12178a30465198f78149b3f936a007ec249fe4cd331c982a09318efb08b8fd5ba4a2d11de62d0d01710c4b0c

        • memory/2292-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2292-1238-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB