Analysis

  • max time kernel
    119s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/08/2024, 14:07

General

  • Target

    d27272278bdb4266ca11ecb700399190N.exe

  • Size

    55KB

  • MD5

    d27272278bdb4266ca11ecb700399190

  • SHA1

    a4dc6f5a9a87eb4697b3b4adac49f717e6939fe1

  • SHA256

    2a3ab7117871abae2dfcf1624723244d9693a2236ad090ca176019f6f29b05b0

  • SHA512

    22b419db89eba27401b062d3c694df2aa2f11e9d587ccb59493646d9a6b2f3430f7dd83418a9f3a70427878bcc3a23d9f486e0efbd83142c415015d63709579f

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9dlmr9umr9K:V7Zf/FAxTWoJJ7Tkr99r9K

Malware Config

Signatures

  • Renames multiple (4661) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d27272278bdb4266ca11ecb700399190N.exe
    "C:\Users\Admin\AppData\Local\Temp\d27272278bdb4266ca11ecb700399190N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-945322488-2060912225-3527527000-1000\desktop.ini.tmp

    Filesize

    55KB

    MD5

    97fc3459a02cbaaa1915280b3c9f02b6

    SHA1

    9b05435a7edc52cb172bf0a1964dd86a4c9bab7a

    SHA256

    160a1a11ce0f5a7c3c91abded47a7cd7a0d762cdb40088552ede78772312d89c

    SHA512

    ba018998b22720b04a02424048a4390ea14f0b38b867cfb87aa5165b4118b0d978cee1af1a2c746e38e730ad951fbdced7155e4af6f0bfa33a3135c3f2ed3716

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    154KB

    MD5

    2bd178ab79c15888856c7f165d303099

    SHA1

    572f5a17088fe9605f64c66cf47b2119d217263d

    SHA256

    d3477af3ce5c98d38d666d55bc913035470b61bc70613cdacab4693b902e9ce7

    SHA512

    7fd19a9eeb132771ead10e2406909a6ac57e4d022f51139718dc04295be15812a955df4d53c3a3d978e1f29610e28cd8efc4340cf905ecda5b913191e72e8f04

  • memory/4080-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4080-868-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB