Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/08/2024, 20:04

General

  • Target

    1d0761f7dce933ee6a72b29be89d254e4f559825f71ec1111415c88d8e5744c2.exe

  • Size

    35KB

  • MD5

    8719629e149a1e46a3782f64e2d8c2cb

  • SHA1

    a13afb41f95e0d0545f9c53067ab1701f4a8d44b

  • SHA256

    1d0761f7dce933ee6a72b29be89d254e4f559825f71ec1111415c88d8e5744c2

  • SHA512

    33c1ed5c4a76a30b976f4b9677c389f6306c063c6207239bc82a3a4fce6854e9768c81974cca9ed13d80684c76c262c3d0acfa8d76004689f52ea0331341814a

  • SSDEEP

    768:kBT37CPKKdJJBZBZaOAOIB3jM2jMO/7OSPipmipr:CTW7JJB7LD2I2IbSaprpr

Malware Config

Signatures

  • Renames multiple (5197) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d0761f7dce933ee6a72b29be89d254e4f559825f71ec1111415c88d8e5744c2.exe
    "C:\Users\Admin\AppData\Local\Temp\1d0761f7dce933ee6a72b29be89d254e4f559825f71ec1111415c88d8e5744c2.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2718105630-359604950-2820636825-1000\desktop.ini.tmp

    Filesize

    35KB

    MD5

    6590e6dee10eb419af810d2d433cca4e

    SHA1

    a03bf8514bf4d5241ef1b31d36bb5322d72df092

    SHA256

    90ff2e4ba2ad83bac2f19b88169d015303bc94396f4ea3d57cbc20d993f196bb

    SHA512

    ac4b7924d13b192bc1540a9c4a5737f537ce63237f3675566daaad54ac562dcfcb0ba08ab60c36ac4b5cbe7cb883a467b03173b5b1fa74d863f02bee7be697cb

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    134KB

    MD5

    f47bc2293b3e590c40f5d645393f4063

    SHA1

    297e6573777d57c71ce308c52e15b4cedc09dfa6

    SHA256

    c4352a7477fb48b357ca1142fa48c56cb4e773f434c105cbdf1d097ee4e33476

    SHA512

    09c76f42cc651b6bdf80848cb4fa51ee063100f4a46058cee1b330a9f86fe11a3895fc56e10d2b7f406a7ecea658e79b2fa5c84004edd379a6754b31472f8bdc

  • memory/3876-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3876-916-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB