Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-08-2024 18:42

General

  • Target

    0cdee55b1412f41442a307c397ec22aae0118979819b37855b1d68f3d6a987ac.exe

  • Size

    28KB

  • MD5

    937d7cf40d42230e78c07baf8a84b0ee

  • SHA1

    3d72f9b3f0582f744d6fb74aff28aa0bf1b97a33

  • SHA256

    0cdee55b1412f41442a307c397ec22aae0118979819b37855b1d68f3d6a987ac

  • SHA512

    f1b37d6b197aa33c9ffc8fce4a98d6dcdd1b782e92840d97bbe5fdb399befba618511e36f426fb58ccb6aca5cdd04ceacf6ea73e804119c4c05f5e8c0d868fb4

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9NNgNR:CTW7JJ7TzNgNR

Malware Config

Signatures

  • Renames multiple (5296) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0cdee55b1412f41442a307c397ec22aae0118979819b37855b1d68f3d6a987ac.exe
    "C:\Users\Admin\AppData\Local\Temp\0cdee55b1412f41442a307c397ec22aae0118979819b37855b1d68f3d6a987ac.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-523280732-2327480845-3730041215-1000\desktop.ini.tmp

    Filesize

    29KB

    MD5

    2e851373ec9d1251f986a773dd38c3f5

    SHA1

    d954f457571f3c69db5ef2e9cc0090d73a0627a1

    SHA256

    6f8c1dc35890ef00cf1793c0dbaf96e7fd7e75169f49f6fb2c4ad348b09e2cdb

    SHA512

    cd8b796a272079b71cda1ed53f0a3d61095a991192431226e9c060920d91e88bb0eaae82732b6ebb46800e965138e9ded0e01837d1aa773d84d5686d551f9574

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    128KB

    MD5

    1d9ad99e5208b6b492f9aacc48ca47a7

    SHA1

    6bccba33c7a86d3384b017f97d06921212c7257f

    SHA256

    3326a00c6fee991999593a37227d5cf01a15cb85bfdc5d0e6243d2e5733319ce

    SHA512

    16300bcc1fe17201ee5ff722f6e49a3cf9295f9273968b97d146398c08ed5be6889186df6abcfe616b52b9621bdfbb1502e2b0587f2831a15e571721726ed73c

  • memory/1512-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1512-1222-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB