Analysis

  • max time kernel
    119s
  • max time network
    109s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/08/2024, 21:37

General

  • Target

    7c908bb27c21587227014e0be99c60b0N.exe

  • Size

    25KB

  • MD5

    7c908bb27c21587227014e0be99c60b0

  • SHA1

    e845f66f9d01b667bc8ba79040ef1a676a661198

  • SHA256

    235939d7797cb03242ab5a0936dfde11e778f1165fe988af399200965c1dfd58

  • SHA512

    312db581123cd0b5463c7cb5fd54650346ac54b09c61ca36f0ac063ee65c3dc64bca89af685ed5874a75c1e4772977f6d535fef0df8823c2ca7268578928d1ed

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9woOzOuiJfoOzOuiJL:CTW7JJ7T4MM

Malware Config

Signatures

  • Renames multiple (4673) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c908bb27c21587227014e0be99c60b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\7c908bb27c21587227014e0be99c60b0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:452

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2412658365-3084825385-3340777666-1000\desktop.ini.tmp

          Filesize

          25KB

          MD5

          bf6311e275d808aa8185757007112ef9

          SHA1

          771dfedb49e027da67511b1d000ce4261796d32a

          SHA256

          6b175207a4e33be72cf28bd6d700286f662cb613d83b08f869b43481fe7baf41

          SHA512

          a35c75482cc8570c295aa3c897a9b4e523bc722362bab6a9f8e5c2d6e750a9b70c7eedee71770adab3945681fe5317cc2530b08436652b7ea84c93461e5d42f7

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          124KB

          MD5

          7b551cb13e25d5fdb16b647a61d1a63d

          SHA1

          e02635cbb0acced2a5776549c593866c7ba714fd

          SHA256

          a45e80efa0e714de6e6e7f157d004d2b3960be8f4ab070cfd33cd2e704cc0204

          SHA512

          9af0a0be28f7ea1a63aaa9362f99a8a1a483a6d33879dfbb3e3c6c23842a07fed8c291deeebd3e270aee7387f8fe0da522f20b2533c953f74b0571580d440c9e

        • memory/452-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/452-909-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB