Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/08/2024, 23:58

General

  • Target

    8ed8ef56a230e086b0ddbcee8449d174bebab70f514bd945264a0cb9885fce54.exe

  • Size

    63KB

  • MD5

    3d7fa93d2e4b0b3fcc12685ae9267dab

  • SHA1

    239258da12d9abefb822e93308804c38706193a0

  • SHA256

    8ed8ef56a230e086b0ddbcee8449d174bebab70f514bd945264a0cb9885fce54

  • SHA512

    b6d3a39908dac124132e0f1812be4211dbaedf995ac0f332c0cabccae3b315dfe928548272aa03fac77145cf26ac50e62aa98d2eb3203cfab2a8e4459e5bf61e

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8zxY5RQmJ0QmJq:KQSox5RQmJ0QmJq

Malware Config

Signatures

  • Renames multiple (5032) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ed8ef56a230e086b0ddbcee8449d174bebab70f514bd945264a0cb9885fce54.exe
    "C:\Users\Admin\AppData\Local\Temp\8ed8ef56a230e086b0ddbcee8449d174bebab70f514bd945264a0cb9885fce54.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4424

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1194130065-3471212556-1656947724-1000\desktop.ini.tmp

    Filesize

    63KB

    MD5

    0760b0e7083ffc011d85de6d99196be0

    SHA1

    1a3873c3d85116d89e5417aa6a809c26acca7662

    SHA256

    26a70adfe46ce953f1bc4bbcc8621e97c17f6aaccb1b5e05494734434d4d0ba4

    SHA512

    17f297e9a0ca24880e6aad22777c2e4fd5864352c5ff62963324cbb5514d0145367823add5784ef40ec89af8cd5f7779d13fb47fda7a28acd1de2ddd60a2cda0

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    162KB

    MD5

    65e6242c962afc95e45ca506073ee165

    SHA1

    b96e69404ca3cf362f3e55f7a07668e9341e4ad0

    SHA256

    f9f97c86829581e1eea756cb1be1b04046420612c21df4130038057c4bc72505

    SHA512

    b70dc08efc35587ae643a2e0291aeef9cb385534c185973b5923e9b2115058337bb6ab7ec8bb3eb5185b6a514791b3e3da404cba98ea210c0581ee22756b6fdb

  • memory/4424-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4424-864-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB