Analysis

  • max time kernel
    120s
  • max time network
    112s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/08/2024, 00:40

General

  • Target

    f7f2712158524e0ef03af2278324ba70N.exe

  • Size

    103KB

  • MD5

    f7f2712158524e0ef03af2278324ba70

  • SHA1

    875b72aff92829342957953d86535a73c24e7333

  • SHA256

    c13c1898917ee930d0eba176fcdadc5ec07907a488c369fa5f0e29e38d2bd07a

  • SHA512

    959f904a2304870e29ba94a582f9b95cb86a3a18ab3232bec14014e7b2119907925f4bb0ceb094f782225311dffdce082a815ccc59f38ba7aeddbea8f2caa7f1

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8IZf2XcqvcYnro:fnyiQSo7Zf2XZro

Malware Config

Signatures

  • Renames multiple (4319) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7f2712158524e0ef03af2278324ba70N.exe
    "C:\Users\Admin\AppData\Local\Temp\f7f2712158524e0ef03af2278324ba70N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4182098368-2521458979-3782681353-1000\desktop.ini.tmp

    Filesize

    103KB

    MD5

    25654a48b379f1d4387f96a9a78cde7b

    SHA1

    65ecdb51e52494a4db026f77b2cb8215e425816b

    SHA256

    5fe09d8b00eb3cc7ecb271685501b269ac64a01a4a9092c14a94cafd443cdc4b

    SHA512

    fd86ae7e72c10f4fbdb01daef65dde29c5a599097e302555bfff279d7d38212c888d6664b55dfe7036fb72ab145a2e4a1dcdfde1fdf78af740e0188827aea2db

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    202KB

    MD5

    3314d7ffce7011ab8187aace3e4be40d

    SHA1

    df769c867def9f2cfc634aafd1f7b21e72a42601

    SHA256

    bf807e8bb49e7ea24e031c8917e4b531a4e143c49e1b53173b64bdadc7fdba73

    SHA512

    b40518ab8c03f634a11694474092083ca14cfd1c5e9322007ec487c2cf500457c5a858280bce607a9cc744d52ccad610a03a7ca5e58b57d3bb4e64cfa66812ce

  • memory/1464-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1464-800-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB