Analysis

  • max time kernel
    120s
  • max time network
    111s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-08-2024 07:21

General

  • Target

    60cf66d71476e64ac1659d7c80a6b2b0N.exe

  • Size

    65KB

  • MD5

    60cf66d71476e64ac1659d7c80a6b2b0

  • SHA1

    2b48b7c0f8bedcfe4fe2e0155aa2f43228ea556f

  • SHA256

    b8a1303dd5775d23b9c2418e3c4baf6340293412246f58c4ddf3c5e9b773983d

  • SHA512

    4a35fe2ab11b01010610e9ef31fe77af2243f5c6d79e7775827bce52cb2fbe6d54663af36352bc5ca22b1479e0d0e26f331fc6ca0f7ccef722305fe57028c611

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATNyHF/MF/6m0mdH:V7Zf/FAxTWoJJZENTNyl2Sm0mdnwNO

Malware Config

Signatures

  • Renames multiple (4624) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\60cf66d71476e64ac1659d7c80a6b2b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\60cf66d71476e64ac1659d7c80a6b2b0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-523280732-2327480845-3730041215-1000\desktop.ini.tmp

    Filesize

    66KB

    MD5

    cd96e1b4ce856ff6b39e8c8be8f02232

    SHA1

    8196b81c98471b3d9f395e4d90a8e51a66dffb90

    SHA256

    349e8c0ac763c7737f92dcf04a5c944bb53e972ce15253efa0eb4f6098c4b31f

    SHA512

    6082b8f057878c37dc65a26199981948fd0b7ae0ce68a934bb872fa6e8c2e6e3732347a7a13a2510f5d94a2e5b92b57d91aa94343fcf2e69c3e5e334eb95fd08

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    164KB

    MD5

    d1ec1917c95bb375f7618a3cffafb4f6

    SHA1

    d90a8072cd257f6b6206e15513bf6256b59d7424

    SHA256

    896017f57f025b45c92bc59db0ad9748491f2460c2f66c2f4debe7aab12184c1

    SHA512

    628d4de339ca28fa50172ead7668c141eb4128d8346cbe2c1be581e6724b8d673fb6ff54106c8f028a9845207cf70925353a943864663e4bd6189dd015601b83

  • memory/216-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/216-858-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB