Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/08/2024, 21:47

General

  • Target

    4ac0006da6a9d41fa8900adc79d0805c72673881f50c08f230fc8a1a36ccec7a.exe

  • Size

    94KB

  • MD5

    d0d504ef8bc9c7c5f1eb4a91a42d909c

  • SHA1

    558e3ed4925297cd21cdbc6082dc06fef43c44c5

  • SHA256

    4ac0006da6a9d41fa8900adc79d0805c72673881f50c08f230fc8a1a36ccec7a

  • SHA512

    d37da08643bf23fe01b3360ce9fc1aeb59678962d49549d07d00f85c925f378354779fc310a4cb4c28c86fe1482dc96499814147f31e530bfc062ff38ef18b98

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcwBcCBcw/tio/tiFBT37CPZ:V7Zf/FAxTWoJJ7TTQoQ3TW7JJ7TTQoQ+

Malware Config

Signatures

  • Renames multiple (5010) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ac0006da6a9d41fa8900adc79d0805c72673881f50c08f230fc8a1a36ccec7a.exe
    "C:\Users\Admin\AppData\Local\Temp\4ac0006da6a9d41fa8900adc79d0805c72673881f50c08f230fc8a1a36ccec7a.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1302416131-1437503476-2806442725-1000\desktop.ini.tmp

    Filesize

    94KB

    MD5

    e5ac46cbeb18a04bb6292fcbe4701ad3

    SHA1

    288d0e3ae81db6ce110fea062645f4df4d2af43b

    SHA256

    95a5e38b2423a7cb11e81bdb09853516dc493abd12a7a28089ee7a90b6a4df18

    SHA512

    2c0ed7421b7c4fc2a40b75925e9f6b8baf80684f4a7c01cdbd71f744e4f8bcbb4a849341bb1a3dcffb941f40d75db6d0ff371bf0efd566b1318f8b1b9cfda4d9

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    193KB

    MD5

    617f01730953825de6f86a8665c3ffdf

    SHA1

    016eee94a053ea44eeb04f622eab6ff34c2f5a24

    SHA256

    68d36e3ad7b606875f9701654bb5becd535275c2c571650522bcc7c28c108be0

    SHA512

    38a84fd441e196c683ad797f666deb011dd13bb50942a3f40f0f34a1d78dcb81c3aca5fc3c8802636199211a856e22c4da291f99531e9708a062731f6957f643

  • memory/232-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/232-829-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB