Analysis

  • max time kernel
    120s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2024, 10:06

General

  • Target

    fe33d3062e23f4ace3ba87af7ddceef0N.exe

  • Size

    74KB

  • MD5

    fe33d3062e23f4ace3ba87af7ddceef0

  • SHA1

    287cf4c63607530a6f03c6f9f063aae2ea719780

  • SHA256

    d4cbfa6d7004f91ee70973767ff8f684066d8089553f13bf7a50814f3e860351

  • SHA512

    2a3b9b4ed4473a98d3f1817a8e5405764ba825604a5551c8963c6ab5ebb7a9170354198f1bf5b0443398c7c757200bd7a5b339609d5343b11c28e6046272827f

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8IZf2XcqvcYC:KQSo7Zf2X0

Malware Config

Signatures

  • Renames multiple (4652) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe33d3062e23f4ace3ba87af7ddceef0N.exe
    "C:\Users\Admin\AppData\Local\Temp\fe33d3062e23f4ace3ba87af7ddceef0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4182098368-2521458979-3782681353-1000\desktop.ini.tmp

    Filesize

    75KB

    MD5

    b175d3eb8dd992d9878a1f34da9dd7cb

    SHA1

    04c60bc1c4e95ee93edd7eb001e663dfeb269c44

    SHA256

    7b561ad39008e0851fce5cd6099731b3da14ecfef5ae15f6ce8581112c777b2b

    SHA512

    c59c53dafb04415d94da7b59480ed9484f0bf2424817f124f163b5268433a601453ddf5dbb9191a3889309e7a1ce88ca3b5c8803f3a5c03f93699b92ed8b6287

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    173KB

    MD5

    f32aeae6f10419eb0b790cc46c4085c2

    SHA1

    f63e2fc36856be63546b60d7cabcbfe78c39cd09

    SHA256

    8229ee7979aa9015b7dbe3a0c2f5fc019e89e25cf8264a8b9e6d1d9b427cd7a8

    SHA512

    78b207ba64ee3b6abdf354df486568814dcd599e013a5bdc1d607477c0da52bdf10a9d352d3c33c8b7c0cae6cd929d4dc1bbde675e0206fdea9bd334988819ed

  • memory/3840-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3840-903-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB