Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/08/2024, 18:30

General

  • Target

    4458886108f7250bcf853baabfcca770N.exe

  • Size

    68KB

  • MD5

    4458886108f7250bcf853baabfcca770

  • SHA1

    71be40052e496236f503f9f47c05a442d8ad95d3

  • SHA256

    8e75be83152c73008320184e978f63053ff5fa3ecf8cb1e5e613c56c4c4add51

  • SHA512

    c5e238304b8012157f1deafb9ffa6d4eb7229737fa57c641061b06b8d1e1d1b2e82cb0c655ea8b71bdf19611f9164497800d47b170394f25beea632ee8506e33

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2r+:V7Zf/FAxTWtnMdyGdy4AnAP4A

Malware Config

Signatures

  • Renames multiple (4638) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4458886108f7250bcf853baabfcca770N.exe
    "C:\Users\Admin\AppData\Local\Temp\4458886108f7250bcf853baabfcca770N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1508

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-355097885-2402257403-2971294179-1000\desktop.ini.tmp

          Filesize

          68KB

          MD5

          bd5030fcfdf3141663a3d6a672ed0f75

          SHA1

          f5391afbf79ee68b5038e4dae3889c8a82406d95

          SHA256

          c2e5dcdf96370af9aabaec71858420a4972210f9866e5204296ef4ee65e6f993

          SHA512

          a28e802dc485ec06d23d3f9c88e06e950988cdafcc29c33ef7e6d97f174129e95ed9d6081e9f90af2b1607d132543681d5033b0f43338d2308ec5f065ba93a8b

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          167KB

          MD5

          a7b7588d8d6995f50d597842a6922230

          SHA1

          cfec7b92584e58128d57e6e237ea71dee366e912

          SHA256

          481d7078ed27f48f6b1e3e3856ed65800b88f58eb1bf1473fc78d93e9db75023

          SHA512

          15749714aefbca4aa13edb3bac3426c60271d43d999644fd6d9638658ce6c626ec5d84290a4929e1b518a0522f025fa3a5d55cb16b2261ee5adfd0e53daf4d3c

        • memory/1508-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1508-848-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB