Analysis

  • max time kernel
    149s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/08/2024, 23:21

General

  • Target

    ad7cbfbe28bba702e74e82f4260c6f40db49849d97dc3befbf02e00eb8ae83e7.exe

  • Size

    90KB

  • MD5

    9864007c31be7cbcb1a37dfb803bb285

  • SHA1

    9256b38a71ec239a36affcba647cc64cd2585d40

  • SHA256

    ad7cbfbe28bba702e74e82f4260c6f40db49849d97dc3befbf02e00eb8ae83e7

  • SHA512

    bb34b5eca0650a0bd21f9179987b7605a1ef343e7cf426308c147153956980292bf04c74a8428c591213235c7cdf4db31f9cb172a85633c1be53067d8607c1f0

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcwBcCBcw/tio/tiZBT37CPK:V7Zf/FAxTWoJJ7TTQoQjTW7JJ7TTQoQh

Malware Config

Signatures

  • Renames multiple (5032) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad7cbfbe28bba702e74e82f4260c6f40db49849d97dc3befbf02e00eb8ae83e7.exe
    "C:\Users\Admin\AppData\Local\Temp\ad7cbfbe28bba702e74e82f4260c6f40db49849d97dc3befbf02e00eb8ae83e7.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4182098368-2521458979-3782681353-1000\desktop.ini.tmp

    Filesize

    91KB

    MD5

    293e4f303d99ca6b916f274c039faf94

    SHA1

    6d70af73b9099621e63f2f4df1981cf9304f9671

    SHA256

    c3c9bb63abf92c370913b7f23f42f9ddcab442f3937987e36e5b467f743dd1d8

    SHA512

    624805a4768b7db2de4482e64d2ff796ee370f113013ff2cd0eb6c3495015ff03fa5c0c17b6d164e5012a2905144720c5296f9eaaf106f7040478fa4a3de4080

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    189KB

    MD5

    8317f832e3aa4813e3aae7440e08ab60

    SHA1

    c2c95934c4e830206ebd1651b4efe7834996f0bf

    SHA256

    607c9e878f111acae19d2af1ae1bc812aeca28342115e08b5b5c6a0cb07dc3f8

    SHA512

    9e488ec0b776653a92aff15c63838c15f68cc0c503d0c2c04d4b2aa145c777338ac903d0878ec9aa18ddfd235b11d1e9f9b4bab17034e7eede527844d78ad338

  • memory/3596-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3596-1796-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB