Analysis

  • max time kernel
    120s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/09/2024, 05:42

General

  • Target

    8867385169545f205b1cfbc3880772b0N.exe

  • Size

    42KB

  • MD5

    8867385169545f205b1cfbc3880772b0

  • SHA1

    5254de899b0c35fad666d7b7c60035966f327879

  • SHA256

    3488303041657476c357893ac6e659f71f3a150016724f30764815499a074b79

  • SHA512

    1b6db802d2332026e295f9ec2acc6679b8c5a7e3be3a876dc33226ed40332ac3fea42aae9a07e2cf3170506ed079029614e518526448a413ba2c97a1d95d872e

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcu90TKe+0TKeinMdi:CTWUnMdyGdyoIOIB

Malware Config

Signatures

  • Renames multiple (4565) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8867385169545f205b1cfbc3880772b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\8867385169545f205b1cfbc3880772b0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-786284298-625481688-3210388970-1000\desktop.ini.tmp

    Filesize

    43KB

    MD5

    0a7cc2fc950bbe3b2b2d7a8175e3b395

    SHA1

    e9f4659d94236110a17626a8fcb8a33ecdffcf0a

    SHA256

    e1c69b8cb1b68fc55755405f088d2f714383892c9a60d6e58a4e860def7e330d

    SHA512

    29462d1476bd16a9054e296e68cc6044445fd5ee5782b9cb0efa64021e31e1d7eb1ee372c3afb4dc720a73db985648d5cb9fdeff0a32e304e6984843a1c8e10d

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    141KB

    MD5

    c28578269f972dccd06ba5c353e5b3da

    SHA1

    95cb4bacb9316a8a49cf724c03742e24cf140c0b

    SHA256

    f09fc49bb40b8ad5c101daee71ca24e7f2d6f15a92a26d51bba8e4096fb13352

    SHA512

    1f322d4fa5aaaae442f96bdeb7766d69873bafe24eb2b04ac56ec0c93a4df164dd6d0ff7d0002add5d0e3f2887a99d1abf0d049f6ad35eef693fbcccc0b11f78

  • memory/4840-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4840-866-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB