Analysis

  • max time kernel
    149s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/09/2024, 03:13

General

  • Target

    d1f97bcbd5f77c0e4b201453e6107d916757626d725842f378cac39ba6c07f61.exe

  • Size

    90KB

  • MD5

    802d0c8fbbcf8bcece428f3e3a7b4bee

  • SHA1

    f42601c2c68e5c4bbaf41b2863d6b7da6ce732b5

  • SHA256

    d1f97bcbd5f77c0e4b201453e6107d916757626d725842f378cac39ba6c07f61

  • SHA512

    5ddb9aecba23836c855d2ca57b7e473f9df75b7b3a1511c865c1c7a8fb96f087aaa72e3e207a7440343f16bbbb1d0f03c1ec983b61e85e4ac930b54fabf77488

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9Sw2Yw24BT37CPKKdJJ1e:V7Zf/FAxTWoJJ7TcTW7JJ7T3r4

Malware Config

Signatures

  • Renames multiple (5018) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d1f97bcbd5f77c0e4b201453e6107d916757626d725842f378cac39ba6c07f61.exe
    "C:\Users\Admin\AppData\Local\Temp\d1f97bcbd5f77c0e4b201453e6107d916757626d725842f378cac39ba6c07f61.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-945322488-2060912225-3527527000-1000\desktop.ini.tmp

    Filesize

    90KB

    MD5

    516e027f4f5de9dc4c297da4233589aa

    SHA1

    c23fd4821d2fe546dc45fa5fc36cc2a1879efc08

    SHA256

    6556edd083a77f316ca5614d358bd018bcc945c35525a205eeb36667b30d35bb

    SHA512

    8781f5c3e75e28469530b025b50f596562093529a23bbebcbc567559e4105c28ad62112f726abbe296b56bfa0d0e956ece15a74c45c636244ddb6d926320fe60

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    189KB

    MD5

    0d3d78586c298bf407449d8191da77d1

    SHA1

    cc35a16ca3beae991839bdd0f8b3c54a5da41431

    SHA256

    d7d9d9aa21f7fd8d93b8ef4c4a16a00de0ef0ecf37d6730eb1f169e7c373a87c

    SHA512

    97933bb85f07313f823f96a83161bf5af6e92ca622c24c19582d6777213e4e535bbe81c8aafe9f204391519757d0c88a0295a8904b96361ff2c80b9b080fe832

  • memory/1400-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1400-804-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB