Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/09/2024, 03:13

General

  • Target

    d1e5f73a8752425bbdaff94952e0fb0b484db9fe9aec01a85b6d377b1825c07d.exe

  • Size

    27KB

  • MD5

    2e4ef1ab8318762205d152e1179d8622

  • SHA1

    e7432ac530ca072a0d9df6933b460975854ab363

  • SHA256

    d1e5f73a8752425bbdaff94952e0fb0b484db9fe9aec01a85b6d377b1825c07d

  • SHA512

    28f3dff7dcc1e0ae3eea6b93b27a68b57d253783af634d7e7a0a0735b57f59584f6c49614fc61054679fede9ff60022b3f75b66b4bb25e9b783d925e5e945a47

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJ1Evd5BvhzaM9mSIEvd5BvhzaM9mSsxmMxm9+9vND:kBT37CPKKdJJ1EXBwzEXBwdcMcI91

Malware Config

Signatures

  • Renames multiple (5277) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d1e5f73a8752425bbdaff94952e0fb0b484db9fe9aec01a85b6d377b1825c07d.exe
    "C:\Users\Admin\AppData\Local\Temp\d1e5f73a8752425bbdaff94952e0fb0b484db9fe9aec01a85b6d377b1825c07d.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1302416131-1437503476-2806442725-1000\desktop.ini.tmp

    Filesize

    27KB

    MD5

    791ea57d448dc6675d63519f66296eb6

    SHA1

    0997f503190e4fc77db4a60aadf8bebbbdf332d7

    SHA256

    1d35cffc090dc2329d31c4faac36da855edc4e759bc28d0e21dba93a41f3ce41

    SHA512

    7c915980a0711547c2709a7d3c990ca97d424b172641d819105f2bc7c228dc0372251f17739cb81272d8151256046d9bf9ace192a62abfdb04a10de8ec9eb625

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    126KB

    MD5

    13a393015fb7a4f4341206b26395e432

    SHA1

    7fc515842b41ee8fee8d10317c17780cfb8be4aa

    SHA256

    5399dc13dc59b41d6aa47a588c074cde56dead6864277417f3cedd0d15e6535e

    SHA512

    19cc98b1c558a14aebab8ca38065494f97b1200ae617876c814f152920234ae8f3b40419b46786959578a1b411c877e2015707136e2fce179ac9b075733dc9c6

  • memory/544-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/544-962-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB