Analysis

  • max time kernel
    149s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/08/2024, 19:06

General

  • Target

    1a8664e95272f11b81f8fa8f5f57a8aca9c6c6ac4cfc0d9609b8480385cc6ecc.exe

  • Size

    45KB

  • MD5

    a86744ad2596957e545bf74d0c29a426

  • SHA1

    49de4f8e8d61e17ff2a0e6f77c60687cabf2c6e2

  • SHA256

    1a8664e95272f11b81f8fa8f5f57a8aca9c6c6ac4cfc0d9609b8480385cc6ecc

  • SHA512

    a082e493b1beb9360bcf8712bc3d5c823b2591a0e1d4a6f1948c7b9961ae2e16f69df07718da3845b5a3d927ed10ff5c7219e2fde686ccc5c768aa69be245d36

  • SSDEEP

    384:FBt7Br5xjL2Kd5AsAoh6n5eaOlIBXDaU7CPKK0TIh6SjeYDTcYDTwWsqWsYyk+ym:V7Blpf/FAK65euBT37CPKK0SjuWFWY

Malware Config

Signatures

  • Renames multiple (5190) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a8664e95272f11b81f8fa8f5f57a8aca9c6c6ac4cfc0d9609b8480385cc6ecc.exe
    "C:\Users\Admin\AppData\Local\Temp\1a8664e95272f11b81f8fa8f5f57a8aca9c6c6ac4cfc0d9609b8480385cc6ecc.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-786284298-625481688-3210388970-1000\desktop.ini.tmp

    Filesize

    46KB

    MD5

    12d6e409773e91425415591e97f57705

    SHA1

    be960dcae655350ef548bf74dc4f54049261aed9

    SHA256

    be9d7db1c8496e8d069628bcc80e7ed7c78d1da776abe0f7f748b450d9cc6093

    SHA512

    8292a2560309057fae1bcf9707fc9203adb53aaed650d249540a53b7cba381c287beafc4f7065af9559de4d16269f7f3f281efcd876a6f3b9f036279926d8b95

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    145KB

    MD5

    4e2a5597748cc64b3162629b605cd0e0

    SHA1

    33c44a31113017d0a7387490d3a1ffe688bc1636

    SHA256

    7b03b9101c8c20a776742cf71cd1c20edc4bb042edb46c93291bb932232ef3bf

    SHA512

    601ed6e53c166435ae8dd8893e996d3cb31eddb81aa606b3cc591318484f3e4499fa06a3b913b15f4dd9e86e057e467c507feabb3c83eb161dd6dd47c1ee2fdb

  • memory/4836-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4836-906-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB