Analysis

  • max time kernel
    120s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/08/2024, 02:35

General

  • Target

    a4e81331e92b7f1e9ca5b5e63ebab340N.exe

  • Size

    54KB

  • MD5

    a4e81331e92b7f1e9ca5b5e63ebab340

  • SHA1

    ccaa676a847cd3cba80dbccd0dbde2ef4911098a

  • SHA256

    941142fda16bec595e24de35f900dba4282fc8d752850b767fc55b960ca5342c

  • SHA512

    e79eaa8a48788620b22ce60ca9e379aef810d13084044dab619279f37475e5f9fd94ba88eae0efa41c99a3a501d9fe6bb2ae75b00659770f027fc6c4d9498cad

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFIB:CTWn1++PJHJXA/OsIZfzc3/Q8IZT7

Malware Config

Signatures

  • Renames multiple (4683) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4e81331e92b7f1e9ca5b5e63ebab340N.exe
    "C:\Users\Admin\AppData\Local\Temp\a4e81331e92b7f1e9ca5b5e63ebab340N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4182098368-2521458979-3782681353-1000\desktop.ini.tmp

    Filesize

    54KB

    MD5

    3199a85dda1098f11eaae676a39cc1e0

    SHA1

    6c1d5a76ce421202250038462d183d6d519b95e0

    SHA256

    2fc348306d09a59a40ae544d76ecde23dd94c2c5e0e18ea1265be4316868844b

    SHA512

    d5c4927fc30ecc67cac626461f57b94d9df7e77aad98f7408cc5a8f469f2b4224eca213b49e25b9f309c2a382de8997e3010d23ca5a25623dfaf7b33bc9ad1ea

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    153KB

    MD5

    d2a3e15ac9b5dac522eeda0294aa7d10

    SHA1

    05dafd0cd61066631be01cb9ea047d97d73b3d4a

    SHA256

    10a36266219597b565ea776f7f361298cf2976a6b3f04d2f47f09e22810c2c99

    SHA512

    0cc0dd98e9044488d894e04cf9123c4b3684552f6482f971200a915eb600d42dcd7fab99e1eb31476db39d93febd7941f4b6b3d3948e9cb8a682ba547b040e2a

  • memory/3832-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3832-1220-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB