Analysis

  • max time kernel
    120s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2024, 02:03

General

  • Target

    874c8ebdad0179c62434c4a545fa9370N.exe

  • Size

    87KB

  • MD5

    874c8ebdad0179c62434c4a545fa9370

  • SHA1

    0a2c9cc9b410b4c2e2fdfa60d3396a4f9dba1f89

  • SHA256

    cf58e2d123776442a3ffc89dded14a16e42e2f96899637b8acd7426433f7fef6

  • SHA512

    0b2c06370fbcf18c20d2bae7c4fa9e357e28345dd1f6714e5ebcb0d06295a41eb3211e3b32feea0e1440f6403e7ea8ce1026b73fbf35c63ec0b69d651ac65c5d

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8wYeHNm5EvD2:fnyiQSodYeHNmkD2

Malware Config

Signatures

  • Renames multiple (4544) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\874c8ebdad0179c62434c4a545fa9370N.exe
    "C:\Users\Admin\AppData\Local\Temp\874c8ebdad0179c62434c4a545fa9370N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-945322488-2060912225-3527527000-1000\desktop.ini.tmp

    Filesize

    87KB

    MD5

    dae8951c0e2c6328c169dd498c85c641

    SHA1

    0a7fd767c2724c8924131c6016098c89b5cf4b12

    SHA256

    01da51ee99dd9b54308ecb1ce243dfb40113e8691ab2fdcfd88f78138bc05cbf

    SHA512

    550b78a00dc186bedc419c85dc77be54dcd9dda6b99e3fe04306b01c6c6fcf2ee143896e72a1a93c790b6e8d1442d8ba539f8ad5ee9aaf6dfa88e08dcf5fca29

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    186KB

    MD5

    f07afce68295daadb1945e40c2b5a458

    SHA1

    804b9a12f12ea784152b0639b8ee317a978e65fc

    SHA256

    1edce683ce92852788ea60b6013bf1dddcde48516a636b73d59abcc7cfae2bb8

    SHA512

    2c289b8b416559a20483041f4e60c9f75f38615b26798cd64823622ba642fc9ae74b3cbcf2c8c205b1313f30a4a67189f7bbcca31c40269543866ee0a62cde3d

  • memory/2972-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2972-850-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB