Analysis

  • max time kernel
    120s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-08-2024 13:36

General

  • Target

    0bfd0c26a86abb43719b778dde4169f0N.exe

  • Size

    90KB

  • MD5

    0bfd0c26a86abb43719b778dde4169f0

  • SHA1

    894fc45dee0f103fbf71cac0082e610dbab80227

  • SHA256

    6e819b61338b7816205f1f7281011772384b06759f2ae19ebe94c4b5a14faaed

  • SHA512

    6368e370a1f02e1ea290e9de0c3817e04f5141983f60fce0b751905d4d30a612893a7feba5a19af56a51f6c797dbc440ea1c8646b2b6923e989d899af6c8a752

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8+xmA:fnyiQSoz

Malware Config

Signatures

  • Renames multiple (4306) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0bfd0c26a86abb43719b778dde4169f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\0bfd0c26a86abb43719b778dde4169f0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2412658365-3084825385-3340777666-1000\desktop.ini.tmp

    Filesize

    90KB

    MD5

    ed1d5188e23f5cf42c0912a052dbca2c

    SHA1

    d1da85018e8db8af186251c19c43480824f44cac

    SHA256

    1720f0eef1729bc0877b14a8f9a7debd649b43f4b7b81aadf701e238d013a225

    SHA512

    55e49e57c711c650bbd26ee8789721684dbaa60b12cea6a307579e6a3e9db7f0fd52c34ccb81e69784fb436f908b339d44503d1f06ca113ad432465181d16f40

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    189KB

    MD5

    efa1e8a725c0a075d1b5723fc486be72

    SHA1

    a15bb009c4394067d0f88456e6ea19057f4dc89a

    SHA256

    16474cb57614ce37cd9805a983f4277eaa3d0213dd4c28faad328d3488790ddc

    SHA512

    0046c9ccfd083861b3db4bdf15e55dabb134462b30eed7a9d0da8141cf46e512b93607517dd948c9941e9d193c368e08abd1c82d6f220d01b4e4eb70f427ccca

  • memory/4228-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4228-640-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB