Analysis

  • max time kernel
    120s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/08/2024, 03:14

General

  • Target

    840f5c8cac312cc7f6ba6327ef8ac780N.exe

  • Size

    25KB

  • MD5

    840f5c8cac312cc7f6ba6327ef8ac780

  • SHA1

    dce66da29555711ce73b1f82056e477bc887d27e

  • SHA256

    8855e66cab61686eb9d46b7948b85cb49c43aab30154eb875598e193df7bb1d8

  • SHA512

    0668196292fc898cd7bb7fbfff945fb6eff6b578da563b9879ba857aa3960ccfe718f316655744e5d7bb97d1026b88f42b50222fe00268839dfa62e3ed4b4d35

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9GyeAJ5/AJzeAJ5/AJF:CTW7JJ7TEk

Malware Config

Signatures

  • Renames multiple (4718) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\840f5c8cac312cc7f6ba6327ef8ac780N.exe
    "C:\Users\Admin\AppData\Local\Temp\840f5c8cac312cc7f6ba6327ef8ac780N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4436

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1302416131-1437503476-2806442725-1000\desktop.ini.tmp

          Filesize

          25KB

          MD5

          e909fe49f1662fc11bcb93b07d4d4994

          SHA1

          fa3b529f744eb496dd4b383cfc7defcf3d34629f

          SHA256

          5ffac9b3e1b2c2a7738c47ca45855ff1a6f2ecc159f471ca85dc7ab0153e4c66

          SHA512

          992eb4e7a672e131504251da7d878e78a6f2e421920fcd1148ffd17059977ba76d35b52ecea9db6f30f01455c37b35ebcdce074c971fe575692aed401c47c74c

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          124KB

          MD5

          4f3201e8a67e8375d2b25f02dc83a0cb

          SHA1

          7f8ef6e53894aa874d2f550167482065e8233970

          SHA256

          43d4644bf783e179683d78a3fef05d55f35ad220790e8f1d5cbd2cc58a9657d5

          SHA512

          3598f90ddbd4edb04b20d9cb96dfcbb9cb38150733f1de19a454e01c4dd9c965c8c70a002b73f5d3ab4afef80d7987b5dbce907a414b1e791c5420ef34930795

        • memory/4436-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/4436-1007-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB