Analysis

  • max time kernel
    150s
  • max time network
    113s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-08-2024 18:12

General

  • Target

    0241b43f628ba3b61fec5143648a55420312f8a1553a740853ce89cf4e3201e0.exe

  • Size

    77KB

  • MD5

    0dc26638c21b42dc6b6bb66964bb6a30

  • SHA1

    962c2ef338157d67d87c65a1d20ff1670ab7c6ff

  • SHA256

    0241b43f628ba3b61fec5143648a55420312f8a1553a740853ce89cf4e3201e0

  • SHA512

    3a463975091b4b6dc59be390627d1b29e4f3e274728abfcbb9042f2ff190babfd08e461d20c45d01b87654a622142138b0abb6b25e638726ef881b5deaa37e06

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rl:V7Zf/FAxTWtnMdyGdy4AnAP4W6t3

Malware Config

Signatures

  • Renames multiple (5091) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0241b43f628ba3b61fec5143648a55420312f8a1553a740853ce89cf4e3201e0.exe
    "C:\Users\Admin\AppData\Local\Temp\0241b43f628ba3b61fec5143648a55420312f8a1553a740853ce89cf4e3201e0.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-523280732-2327480845-3730041215-1000\desktop.ini.tmp

    Filesize

    78KB

    MD5

    a34ae6a666392cd1a8fa648cadea3f2d

    SHA1

    be8fc07da52bce6a7d0822a9de1130a1a7af1a66

    SHA256

    2f270526ee472e756bcec8db9777c6626cccc0ee06034b235cb8aa9df9980507

    SHA512

    18ed0e1d9db61e9bbbd8a02862c41d3bb14a8d2410f2c69c78708f0ee96b8c03cd1350df9d2362f2e207427aecd6feb8f3166bce41a96d547d2b5714314b10ff

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    176KB

    MD5

    1f052db97829e290f042cfa08f07081d

    SHA1

    4e79fae99a611c04d2614bf7b3c8c3ccf4539c4e

    SHA256

    5835185b6fc54bd95de7890ee7128a61d0f7eaa99b9b31d11029595e3f4934aa

    SHA512

    afc76b05b36288062e621362d7653463d4925d9a647808b2a39cf46b9f47f027e2a539f07da66b38073251d85c8f9d5fc13026bb10c647d3cede28e5683e4157

  • memory/724-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/724-860-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB