Analysis

  • max time kernel
    119s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-08-2024 19:13

General

  • Target

    aa331774632f19d59631e7b264cc2ad0N.exe

  • Size

    53KB

  • MD5

    aa331774632f19d59631e7b264cc2ad0

  • SHA1

    5d9cef095f60f123067ba26a1963e1d3f105db0f

  • SHA256

    223a86241b6d9215f5515e0302d1a691a8c1c4d7d5480de336c2285dfdbe8698

  • SHA512

    ee425c0887557fd2f8db03227628475041c181bebb7520677cb8938310f71f37b1a674312a84b28c8c54824a82efb8073a4614a521b704d77e2c7a5be162347e

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFIu:CTWn1++PJHJXA/OsIZfzc3/Q8IZT8

Malware Config

Signatures

  • Renames multiple (4655) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\aa331774632f19d59631e7b264cc2ad0N.exe
    "C:\Users\Admin\AppData\Local\Temp\aa331774632f19d59631e7b264cc2ad0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1302416131-1437503476-2806442725-1000\desktop.ini.tmp

    Filesize

    53KB

    MD5

    2bab4b53ef480c738a871ba15abf2787

    SHA1

    daab4bc3d3dd39bf2b1d2b1c144ce54973ab4502

    SHA256

    ba4d1f1cfa93615807c90d48b55ad2e7150f74e8190f5db9819e7b477345f8f2

    SHA512

    2b434a57e81fad9e274a7b67d0b821cf0bb3b298ee3322ddfac75be70fcefa8f5e4634c5841c9c25498b4b2d35d30a0792453b9f2c0a10aa7a3c4cf090d88e11

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    152KB

    MD5

    1a0b9f421e8c571331f59b32ba70c5b4

    SHA1

    7ee9220429bf16c18c55bcf980bc4a20afea5355

    SHA256

    a02855b57b49b80abbb4757db7c1ca5c4d733f8a585738d11b0b1390d5180d11

    SHA512

    f41e43b0f106d57785a0f42214d25599be6d61b408987381b9123dd8f81e7f49433b4a5d05bc7d68d058dacba8eb1c95fa610fedd3ab882583bfaae3fb19ece3

  • memory/3472-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3472-1124-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB