Analysis

  • max time kernel
    150s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/09/2024, 01:47

General

  • Target

    b445d0981c2dfdb738714e3d5cba49402ecd985e031d4ebf99e6ba351460d1e4.exe

  • Size

    133KB

  • MD5

    b5aa57077e20f58b8927aa225e3f9eba

  • SHA1

    3463d4c52042e7b197a4926eb144db74dc25ccf1

  • SHA256

    b445d0981c2dfdb738714e3d5cba49402ecd985e031d4ebf99e6ba351460d1e4

  • SHA512

    f7683d56ce0e4f5a0d8477d2304154a2a21f2107320e9c60110d959cbd7bf5373a62a914468dd3acb5814a84a443d748f296cdabdd13196d726f091b4bef3726

  • SSDEEP

    1536:V7Zf/FAxTWtnMdyGdy4AnAP4FeUe5TWUnMdyGdy4AnAP4FeUeW:fnyGnpAOeUefnpAOeUeW

Malware Config

Signatures

  • Renames multiple (4830) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b445d0981c2dfdb738714e3d5cba49402ecd985e031d4ebf99e6ba351460d1e4.exe
    "C:\Users\Admin\AppData\Local\Temp\b445d0981c2dfdb738714e3d5cba49402ecd985e031d4ebf99e6ba351460d1e4.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1944

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-523280732-2327480845-3730041215-1000\desktop.ini.tmp

          Filesize

          134KB

          MD5

          2a48720c982d206c92f28ef82b20343a

          SHA1

          df8f0f43d2e90bb270cd63073eba3cf89c34e955

          SHA256

          c9541c3be36887614235cd882507b462c440787750cd2386b34ea3a8fb1d1689

          SHA512

          0c2f565aeed0f4bedea88b08df7fd62cda4a702bde4fd0e8b27ed119edd14fc20f65ea2233c77a6d3d272b4b0cb1935426749294c299c8b4b9f3d5675068f1d3

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          232KB

          MD5

          810cfad34c3266d5065de57b9a342b24

          SHA1

          5318591bc9cea02ab213bca2dedc91bd43862c99

          SHA256

          2c638d0a7af66466cf180099f98d1af14ca6f3370101abe78f570da2268e84d0

          SHA512

          832de2eeb65ed070dda72dbbbd03562f532c3bd3c7f83b2de59b883f2e699a92cb93bee65d322903ba7209e635f2a9286b505107839183f994af97ebbf0df3eb

        • memory/1944-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1944-804-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB