Analysis

  • max time kernel
    120s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-08-2024 03:32

General

  • Target

    40180e114f2d742b83e4d51fb6370d80N.exe

  • Size

    73KB

  • MD5

    40180e114f2d742b83e4d51fb6370d80

  • SHA1

    46b0f86fb905fd8c5e1902428ab9baa8734167e3

  • SHA256

    9c4fe2cb07deb134a853565e85cba74527167f1c072a08bff3439458a6c9a134

  • SHA512

    c928eb336d1ff78825594c19b97996400c8ac6693efeb2e4ef7bae444db1bad48a97dbe85056ee9eeddd082e26bb1854284491e7d117b1f16950028bce4e5382

  • SSDEEP

    1536:V7Zf/FAxTWoJJB7i2JalYNRw3XTW7JJB7i2JalYNRzqUS:fny1c2JaCc2Ja7

Malware Config

Signatures

  • Renames multiple (4533) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\40180e114f2d742b83e4d51fb6370d80N.exe
    "C:\Users\Admin\AppData\Local\Temp\40180e114f2d742b83e4d51fb6370d80N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-355097885-2402257403-2971294179-1000\desktop.ini.tmp

    Filesize

    73KB

    MD5

    91de4b4c989d3eedd7486c935a5dfb10

    SHA1

    b222ad96a3ce834b706792f79800487d5d7b6933

    SHA256

    044715cf2fe0d8ef04173193c89fbda05c9c49d45e1a2303d49584c85514a1f5

    SHA512

    00ed435f0083c16d84e9249a7f4f0cbc8b7f4ccff993445e234004bee17a8a3ebc364d4cc21a3c88bad830273be427045e0a4ef34ba84810d8358b47441cd04b

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    172KB

    MD5

    f656c9255e21a78703dba8848aa5e5fe

    SHA1

    9e4218bacf435683018738ea97241e40b7c374c1

    SHA256

    041390f28ffa26f1478c7c5a817c75a90ddf2cae1f929ac0171aa371c4aaef1c

    SHA512

    9a001ac8740e6efb926b9061067ef178446be00d38e5e59adc0d160ad8308154cf6263bd138a90ea7c38c3d585405098202ea6e0e862836232af0c1356a8951a

  • memory/3372-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3372-856-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB