Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-08-2024 00:29

General

  • Target

    8d5e57f7c0dc2e319c39f860275c64b81365c4f0adf67acc01abb02b03cd5164.exe

  • Size

    46KB

  • MD5

    108467a588118998f14cddf26373d3a9

  • SHA1

    ea3114410966039e1eb9ab070b00eed64a460909

  • SHA256

    8d5e57f7c0dc2e319c39f860275c64b81365c4f0adf67acc01abb02b03cd5164

  • SHA512

    6767dc7b426b1acbbe074f94af27f4ba6eb37ef9b0a6ff7a61ec83cf7fb40dab1e804ccee428541d1adfe1f31acf5e9505e2d4f919781dc0f15e6d76d6839f52

  • SSDEEP

    768:kBT37CPKKdJJBZBZaOAOIB3jM2jMO/7OSbo5+Oi6Jfo5+Oi6JvEXBwzEXBwkqA7a:CTW7JJB7LD2I2IbSq+12i

Malware Config

Signatures

  • Renames multiple (5196) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d5e57f7c0dc2e319c39f860275c64b81365c4f0adf67acc01abb02b03cd5164.exe
    "C:\Users\Admin\AppData\Local\Temp\8d5e57f7c0dc2e319c39f860275c64b81365c4f0adf67acc01abb02b03cd5164.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2718105630-359604950-2820636825-1000\desktop.ini.tmp

    Filesize

    46KB

    MD5

    d3cc679d605f4d5d369d525a0b410a08

    SHA1

    35dfd6f05ca7983252d938cea979e2583448063b

    SHA256

    3a50280999a65534e4a94b407ecd2743555f9888b3c133b58f52fe2e654cbf20

    SHA512

    4c94d95f9ba484730c09694f4f3c730d3bebceacb393c7ddb92893b3de2451e09708984e258a6ffcd2a7021b98fc2e6f6b88f57e9d940029a741ee2afdb6f51c

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    145KB

    MD5

    a3e3c75b3008231de7ca5a450c7b2f26

    SHA1

    52c4743adc89f75f34d20303f4159cb325b58f2f

    SHA256

    c2f7c022bbd84cef5ace2f63db43f478287046822be0d6122f8c011e932db030

    SHA512

    9cb937c9e0033a98c31578036a16e9ad3dba74950c202ef9425f34bd5c0995b021ea15a8694d3bed5d041976dfabeb1e18349933f4b477cb2530e6d27a4ccdeb

  • memory/4512-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4512-942-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB