Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-08-2024 20:52

General

  • Target

    37dabcae453c3c6b3e291b6bcd5fd5b7538ca02d76f6382fca890c6b60696e0a.exe

  • Size

    57KB

  • MD5

    b508dba54122afba49063d793c5d82ea

  • SHA1

    2cd96c99935198a2ffd7f4353ec803e1c1701803

  • SHA256

    37dabcae453c3c6b3e291b6bcd5fd5b7538ca02d76f6382fca890c6b60696e0a

  • SHA512

    53fca5ec6e8d3425400c60e48cf678e107e2a3459c943647b821865bc321ce535919165be7b4acf65922bfcbfbef76c8f661242ed5419ca2f9aeaaea191964b4

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATNyHF/MF/6m0mdx:V7Zf/FAxTWoJJZENTNyl2Sm0mPWW

Malware Config

Signatures

  • Renames multiple (5113) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\37dabcae453c3c6b3e291b6bcd5fd5b7538ca02d76f6382fca890c6b60696e0a.exe
    "C:\Users\Admin\AppData\Local\Temp\37dabcae453c3c6b3e291b6bcd5fd5b7538ca02d76f6382fca890c6b60696e0a.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2412658365-3084825385-3340777666-1000\desktop.ini.tmp

    Filesize

    57KB

    MD5

    5e67d32052ead62cd8ee1145df16317c

    SHA1

    e9aeb542696da9af3c7dc8b2a4662d75d6fc80c5

    SHA256

    a598dc37fdd76ec879b5120c49e423b9dfa04ab12fdf45b9fd447c06e02feea1

    SHA512

    f6da540738d407802cefce6e01e198ffe38fdffc39d406f252692a46ccfe5512367be4197ea48393cff55eeec7262af93e900134da7cd503f094c108a6619581

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    156KB

    MD5

    59d1157ee5d02373344c2f05a45ec41c

    SHA1

    733ea9dc7ad39e9e9e313313a7575d2b9b46b5cc

    SHA256

    6d688c36612811fbea4b90700e32733ec6e117a0437708a60ae1673eef0eaf7a

    SHA512

    f88f26e7842364680b21d52cb1dbd4bd6494a337d50cccf115ea2fff1159d46076171f506099773f28bc5f94b47b93e59a208da698221bdf56b12426d068bc67

  • memory/2504-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2504-874-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB