Analysis

  • max time kernel
    120s
  • max time network
    111s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/08/2024, 11:46

General

  • Target

    2e768a9c7a2ef7e8132f1e9fc55d5af0N.exe

  • Size

    58KB

  • MD5

    2e768a9c7a2ef7e8132f1e9fc55d5af0

  • SHA1

    e4101e80a021dd670797213c4742732e7d9efcc8

  • SHA256

    81c6ed542d39dd24085bd6baf9f3fe0723fd1be69cf822afc6e29c3afd99d756

  • SHA512

    7f2d8efdecf4d705f272daa9b2c6e6bddeff4eb631f6f6af3a023d974bebf0e6b336a3110b5e2e32a5462134e546777e77dc9c086279deeac60e816eccace024

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFzK:CTWn1++PJHJXA/OsIZfzc3/Q8zxQ

Malware Config

Signatures

  • Renames multiple (4651) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e768a9c7a2ef7e8132f1e9fc55d5af0N.exe
    "C:\Users\Admin\AppData\Local\Temp\2e768a9c7a2ef7e8132f1e9fc55d5af0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3832

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-4182098368-2521458979-3782681353-1000\desktop.ini.tmp

          Filesize

          59KB

          MD5

          3ec4efcef9572d9ebb7efada15b005eb

          SHA1

          be212003b262c7882d755e7205da45dda7c83867

          SHA256

          95b522212abbfd265955b83ea8f0a68ce1b866840e329ef07cab5a0161d63368

          SHA512

          e72e0b10a87ed76b9878f56594f2fccdb5dc0168ffcec41a0a8171ba04452df835305f466b8dc5b75e86f80c5cceedcaf731b422f3592b788dcb675cca5bf75e

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          157KB

          MD5

          47627be78dd4c95fa09c63e2e459d4a6

          SHA1

          022464650115b8091dbf635cf8ec434e06e0a77e

          SHA256

          fe00f2e6aedc251ff511f261a38da150553ced0f8fcc91e8df524aa5d5704bae

          SHA512

          5dfd2a138da2fc1ad7fddb2ca0449ff12fd1f2f84fab8b3aafe1b08df2c89f53c3fc802c456b1f263fb34389546bf11f4985aff337ef6befbf3676e2df98e3e4

        • memory/3832-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/3832-912-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB