Analysis

  • max time kernel
    150s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/09/2024, 19:52

General

  • Target

    2a51a89080104ea9c529a3687076421acc489a348c38da0fff4b598f5b79cf5b.exe

  • Size

    25KB

  • MD5

    9b27cc2bdd005d0106f82f8eed1a2e14

  • SHA1

    ed60f4151e0c8e3e0fd654b74749bb1669e6cf9d

  • SHA256

    2a51a89080104ea9c529a3687076421acc489a348c38da0fff4b598f5b79cf5b

  • SHA512

    0ce08d026dca615ffa408b1beb99d09786a50e15a6e403234c6640e032b43fd01c09390ee662c4350baa3440fdaf54019b71152e51cb044e89d789f7324c3e4a

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJ1Evd5BvhzaM9mSIEvd5BvhzaM9mSsxmMxm9+9ZmuOQk:kBT37CPKKdJJ1EXBwzEXBwdcMcI9nq

Malware Config

Signatures

  • Renames multiple (5044) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a51a89080104ea9c529a3687076421acc489a348c38da0fff4b598f5b79cf5b.exe
    "C:\Users\Admin\AppData\Local\Temp\2a51a89080104ea9c529a3687076421acc489a348c38da0fff4b598f5b79cf5b.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-523280732-2327480845-3730041215-1000\desktop.ini.tmp

    Filesize

    25KB

    MD5

    05af5d3f717eda1c0c007a9629419f70

    SHA1

    42ee7c856ac0b9b2e845d0a69ef1047df4a8a646

    SHA256

    8debea963b7ac1380fd69347b40177724b6c4e3fd8566ac12d5e5bc289079274

    SHA512

    938699c2642c757b610c5539305ef7fc97800c2acb30070c76af4941be7152077ae9bc50c5d5a5ee0cf4b506fe0dbeec21e96bc6f6bcac23f49c3966b8dedc90

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    124KB

    MD5

    42a242dcd0e6022f98a521618eefe8c2

    SHA1

    8248a4190e5f6622039bbb523f5de72830c79e0d

    SHA256

    58c22c89f025a8338d442ec94865a34934401b46d03a07f5d17fb8164db8805e

    SHA512

    f38f65e5d7590709e4b7d44c051342e92bef08dcb1cd30e19f93683e037803a96fe3860704b55070b161d8e266777d61e92645a8dc1d95eafd8a6eeaa3dbf86b

  • memory/628-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/628-866-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB