Analysis

  • max time kernel
    120s
  • max time network
    110s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/08/2024, 22:09

General

  • Target

    5fa15212cd979d9fb25027c1939e2300N.exe

  • Size

    34KB

  • MD5

    5fa15212cd979d9fb25027c1939e2300

  • SHA1

    2b487ce80f20f4e02beb3d1cd67b6146aae34870

  • SHA256

    708bbaffd90863ec5252589a48fd53359e8bbe5b2a09705a557ea569c05acf34

  • SHA512

    49e11599982a8fa99581a8f62de27488993a608bb8343a650c23ed5d7fe2d4bcc144c88abdb23e431a8c4b69b25774357b5d75136956a7043803f2447d8b035c

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9RxsZvxsZT:CTW7JJ7TXwQ

Malware Config

Signatures

  • Renames multiple (4685) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5fa15212cd979d9fb25027c1939e2300N.exe
    "C:\Users\Admin\AppData\Local\Temp\5fa15212cd979d9fb25027c1939e2300N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4608

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4182098368-2521458979-3782681353-1000\desktop.ini.tmp

    Filesize

    34KB

    MD5

    6b2dace69ab0a543bed221a8829134c8

    SHA1

    94b0c9f22c24a8aacb763ee37b56e644992a6e8b

    SHA256

    7a47252312fdf68c5e2a4effd4d115c4d1133f3e0ae0e086ef04032e826bea8c

    SHA512

    cf98811c7f1ea60c7aea689b1da388f5c25b888dd7fe52257dc8850804b81e9f2ca48a26df24916373adc9f41ee08495f40c1a28b129441b2b022dde83562601

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    133KB

    MD5

    7033c83c308cb10ce23d969af0de22ec

    SHA1

    684a334b61df9c45138efd38ef96c808a3991b34

    SHA256

    2dbaa3f06110d7d5b034d3e5dc6c8c27ae33c35142f183683fe1b00cc42f4516

    SHA512

    ca7a63fc564c23dc99a4262f7106b2a32ba733fafe0fe92b8a6c6b74346f36d98f9a70101aa0fd830a1720d8e6dbb3819d245ec82a80a1c122999c0cf90957a2

  • memory/4608-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4608-1011-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB