Analysis

  • max time kernel
    150s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/09/2024, 03:45

General

  • Target

    db40a267a1e9b5040689462a0b56da2e5d594f637e5877d9c3823442d8eea33b.exe

  • Size

    23KB

  • MD5

    224ebd7350841f99ea0745e5d6a71f6d

  • SHA1

    588803c9443dbbd0b52ae4e3e60f208eeb44f7ab

  • SHA256

    db40a267a1e9b5040689462a0b56da2e5d594f637e5877d9c3823442d8eea33b

  • SHA512

    5201acc68f9d4abe3681ca2b59ba5b54805313ceaafdd3e4427d8869f5cc42b53e22ca1dc0642dc6d6d8a428f4de38672c5451ff2227c6b74b7785eac7008242

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJ1Evd5BvhzaM9mSIEvd5BvhzaM9mSsxmMxm9+9O:kBT37CPKKdJJ1EXBwzEXBwdcMcI9O

Malware Config

Signatures

  • Renames multiple (5356) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\db40a267a1e9b5040689462a0b56da2e5d594f637e5877d9c3823442d8eea33b.exe
    "C:\Users\Admin\AppData\Local\Temp\db40a267a1e9b5040689462a0b56da2e5d594f637e5877d9c3823442d8eea33b.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:628

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-4182098368-2521458979-3782681353-1000\desktop.ini.tmp

          Filesize

          23KB

          MD5

          872bba2a5633baa85f88a7485403cd8c

          SHA1

          b6e1919d14c54aabb2cf464099f97ddaa6639150

          SHA256

          21f88049237cc8fb57d1c33268cb52a3eef7133a492404882b502bc8645e670c

          SHA512

          65a2e3c4ed11270b66b4d776c22986f1de9c7ff3d1f07630eb4400527861dd82e2ad6795257ffaa268f189b2ef2bb8d93eb1a4e2961662a0c4e4af61aad89a3a

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          122KB

          MD5

          7a39557798e42ac70afc14b6d0b27f3c

          SHA1

          eff89e1c9e6ec7149549a75f18b466ca49b51b9d

          SHA256

          efecb208a6d01fb9957e448c5ef7b7c591086f8f92c51a39a795418fab93f516

          SHA512

          733bc008b6c20ca95b2f5f7b9802e8f55cdc80a701456392ea9bac05f4e40ffdbd1c12ee000e80297c8bef35c6e4cf12fe44f674ae71556fc0fe94fbb0a47a68

        • memory/628-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/628-1060-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB