Analysis

  • max time kernel
    119s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/08/2024, 21:20

General

  • Target

    b712799747fab32e90680a8fd39aef20N.exe

  • Size

    29KB

  • MD5

    b712799747fab32e90680a8fd39aef20

  • SHA1

    091ecf3ccece9ad4664efae9e38f70e60db320ca

  • SHA256

    cc9dd4b4e42b71c4110268f7534281357f02ab56b631f2ec65d6cb1eb74c3991

  • SHA512

    d6fde3c2a89cb6010b730a089d25305b4616186bb77768c4931b4f3ae6e656a43dc51060991b40ed7ece11f98bb95da90f02421474111d765f78eb714c54654f

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9PyUV3myUV3X:CTW7JJ7TVym3mym3X

Malware Config

Signatures

  • Renames multiple (4674) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b712799747fab32e90680a8fd39aef20N.exe
    "C:\Users\Admin\AppData\Local\Temp\b712799747fab32e90680a8fd39aef20N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-523280732-2327480845-3730041215-1000\desktop.ini.tmp

    Filesize

    29KB

    MD5

    bc4b6290d0a04fcbb9be7193d785f52c

    SHA1

    aeac68b5695921d1a85984c718cc78a7a0f4f442

    SHA256

    9ffc8ced98b56e261b6ae333e2387e69c9fc564f6117fdd0e62dd119281910f1

    SHA512

    792ed6257ac997fc8a79ef64977b4af8ffbb0ac20a085ff58cc4640fe0c34dbee04de775c035cf440c74e5f3f79ef340248e096abe0ebd6fd5216dae731118d9

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    128KB

    MD5

    61e85cc1d28506e831fbd343be164545

    SHA1

    4bf17acfb27a8959f5274ce2893394028b9339bd

    SHA256

    df47e8378c6452f230b18aa44067ecbdb9293b89907b0115cf59ff52ed6a85af

    SHA512

    d1a2becee62c448e8e7ba0db02d057a0566f54e7b9ab82d3cc2a10306f8cb6bc4c3358bc69b85ca57d1b1c1fc0d99d5f6cfdeee66f6bb897c247a93560021071

  • memory/2884-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2884-934-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB