Analysis

  • max time kernel
    120s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-08-2024 16:23

General

  • Target

    80276ca772d47c3e792f06b1b79541f0N.exe

  • Size

    57KB

  • MD5

    80276ca772d47c3e792f06b1b79541f0

  • SHA1

    afcebb86a302361d82e39616bf8da0c9542535a8

  • SHA256

    cbec52db28b7fc46b046bef4e6e94488d7889c297639432517c976408cff940b

  • SHA512

    bcfa925b246e3c48672a04d45ce346cca11aa91f9f243031ae2f2eeaa20b9b618ef768be02af087fb986803d0dbb48e17cea0129bbd8f491c53b2a558e24cccb

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATNyHF/MF/6m0mdC:V7Zf/FAxTWoJJZENTNyl2Sm0mGnL

Malware Config

Signatures

  • Renames multiple (4648) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\80276ca772d47c3e792f06b1b79541f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\80276ca772d47c3e792f06b1b79541f0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4072

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-355097885-2402257403-2971294179-1000\desktop.ini.tmp

    Filesize

    58KB

    MD5

    729d1b286df547e6e3804d39ba687b77

    SHA1

    82da50eea47ab9c803b7a0cb5add88f1b7b7dd33

    SHA256

    e5d0a8b85ab959fa1a6416ab56387daee6c63d1f7baed70f42656b753c0fc4a4

    SHA512

    a356a25bc1ff6a83227682b96b711599d83a8bee7a02c49372f5875f6c4cfd5fa94502f6c5fceaa9cd2015fe3ff789036f8e8550d2126f880ace6d6c69393158

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    156KB

    MD5

    9ee4ec2a00c064c144b2b66e584c6a57

    SHA1

    9b35b7bb6eb4e12205abe591959a0d0c5f5ee7e5

    SHA256

    aa55051d0ccceff92db2a40bfa3ee685918a16fe401ea96d24d776e8754f00fd

    SHA512

    9b2aaa0923996dc30697ae191f33a0ade8d592eda166be6316d92463c1c4e9e40e11de892862b485afc3a85480d166c60a9819c52ed632327868b8c59e9e0118

  • memory/4072-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4072-1960-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB