Analysis

  • max time kernel
    119s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-08-2024 07:51

General

  • Target

    4b020b5c2ba64eb8ecd0f8b13dc3cb00N.exe

  • Size

    50KB

  • MD5

    4b020b5c2ba64eb8ecd0f8b13dc3cb00

  • SHA1

    6d9cf9ac70b92c5834a2faeab6ae458e854a051d

  • SHA256

    3f5583f75d4367c25a1bdf9ddd1cd1928150b9573ccdaad290c160667b01ad7a

  • SHA512

    9a9f4f447e3d693e34f0c251057c8be36cc725278dee8135664cab236f187b3276773862a5dac317437586eaee9d891b3399fe8e9ba41a953d1599ef1ca39cf8

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcu90TKe+0TKeinMdZ:CTWUnMdyGdy4AnAP4Ww2wg

Malware Config

Signatures

  • Renames multiple (4652) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b020b5c2ba64eb8ecd0f8b13dc3cb00N.exe
    "C:\Users\Admin\AppData\Local\Temp\4b020b5c2ba64eb8ecd0f8b13dc3cb00N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-355097885-2402257403-2971294179-1000\desktop.ini.tmp

    Filesize

    50KB

    MD5

    fccfeeb4fa92c50812d5dc8d6d4d115d

    SHA1

    49f4882ef150bcd0a617ca448001de29827b7f25

    SHA256

    c0794659561e521612a5c771f9ffef80d6cf6be7a3634db50f16f169072e1551

    SHA512

    bf3cce71762d3000637d6b664d44d6a3d51ea466962b04bb0cc0f9ce3fb223ac6ceb6e16da72908a28bd387dc89302f4517099090a045685ae991c6628601527

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    149KB

    MD5

    7cf8594db6f90ce52435f6eae5f493f0

    SHA1

    e9bdd0cb19c1c4ddb98fe07af8f10716617a6ac8

    SHA256

    2deb079e862c14f9d51e10d0de352527020e4c4708870c60fdbb118cfd6cfd56

    SHA512

    c9016199fbd7e97f84c53fa760f3666f44ab2a5e5c42452775df754ab564522a32d6cc71a9c876d7afdf928a90237844590af4aee5a6f4f4d44b43eba7347bf4

  • memory/2528-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2528-934-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB