Analysis

  • max time kernel
    149s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-08-2024 00:14

General

  • Target

    89f1d38a2ac2944368fb13c36a1d910ea5bb946f0106bba1af3c4d1731c5b99a.exe

  • Size

    52KB

  • MD5

    33469b6b6257bea3be7cedb127abef1d

  • SHA1

    3e2cea0f180c47f59fddcb0390254080e609821d

  • SHA256

    89f1d38a2ac2944368fb13c36a1d910ea5bb946f0106bba1af3c4d1731c5b99a

  • SHA512

    89cf5b795b5af40832f9e275d253400a62ffe5bff15b7bacfd33706590d67fb8be3d1548e4d0a5aff8e1b7d6b57edb3bfed20068518cbb001690a2a2878d1bdb

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9DQ4NQ4z:V7Zf/FAxTWoJJ7TVQ4NQ4z

Malware Config

Signatures

  • Renames multiple (5193) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\89f1d38a2ac2944368fb13c36a1d910ea5bb946f0106bba1af3c4d1731c5b99a.exe
    "C:\Users\Admin\AppData\Local\Temp\89f1d38a2ac2944368fb13c36a1d910ea5bb946f0106bba1af3c4d1731c5b99a.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-945322488-2060912225-3527527000-1000\desktop.ini.tmp

    Filesize

    53KB

    MD5

    f625ade2404f5d312ef053f61c968c26

    SHA1

    17752b897db4f29c69624962531a8bd259cfc264

    SHA256

    d9b0f9a9b30f9dc8afef421066fd7d40a6c7d9b409f6a19c47b8a126bf65bf72

    SHA512

    76f695babf2688f388af195ab9430e36f60442e56190360a2c23a81eddfc6ded9cd91472e59c29f224a5bce58f7d662da29110e5f0dd139929bb3fe09876c583

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    151KB

    MD5

    66df5f21c1d973c3f2b1f9ff046e0504

    SHA1

    399f9a16a6641402c88a61940bc7c142f79ce93c

    SHA256

    47c746e792c9af1c0daaaafa9b063f55390650b04e7d539bec3874ac894d1f8b

    SHA512

    1c8f28f25fffd5fb981f357e687d90db5c39e516516159a933439ba86fb78e4f74350d53f68635fb47c6a7cc09fad54eb3aa36842bcb888a47814018d5fd2fed

  • memory/3196-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3196-902-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB