Analysis

  • max time kernel
    120s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/09/2024, 07:17

General

  • Target

    bcad7d3f72a1620bddb3d88446aa5290N.exe

  • Size

    84KB

  • MD5

    bcad7d3f72a1620bddb3d88446aa5290

  • SHA1

    4486acda01c06b388833beab28816684aa780094

  • SHA256

    5e81772520ed399b8f1e72be0d76d88340a1fe7fd376c9ebaa0f778948ead9a4

  • SHA512

    b35636bdb27d7048f49a33b639db2277f15bda83e55c0cbf938272eadd851198fcb0e71e03e1e179b7a184e02cc43a5f72dd6cac8b717eeabb70f2a23c8fdb07

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxY546TKJ:fnyiQSox52

Malware Config

Signatures

  • Renames multiple (4364) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bcad7d3f72a1620bddb3d88446aa5290N.exe
    "C:\Users\Admin\AppData\Local\Temp\bcad7d3f72a1620bddb3d88446aa5290N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1302416131-1437503476-2806442725-1000\desktop.ini.tmp

    Filesize

    84KB

    MD5

    3b39667196fdb3c1301d508c5e053518

    SHA1

    0144d43bc54a2c873a7e26fbed6a578f920c2dbe

    SHA256

    872c68a465852d3dbc33386952497ee3d89e31fb0f0accfb3b77fa82de4f5b79

    SHA512

    13ec03e3eaedd11a3f8633e451e0f04c939c3ac269054ac5c07e68c3ff747de933c0f22242e911759c4caccc14d0e940bc55b3857b4e4aa832606107b279e71c

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    183KB

    MD5

    4481f36b87dc7539b3ca78ccf417be0f

    SHA1

    1fc41f0994d4f0113ff659ac9f5efc208b8329a1

    SHA256

    7fc6d7c4f816ee99c29442d78abe53efc4d7999a8fdd2a4f566742bbf0bc908f

    SHA512

    ebfb750b663a98cde029d2fcf6b429c1e6da5a3eee6252c11d905cbaf5fd39abcea2429b1dcc3efd7825ad0abb24b8014f427e6389bccc90dae302acff5ce004

  • memory/1560-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1560-760-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB