Analysis

  • max time kernel
    120s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/09/2024, 13:05

General

  • Target

    8b3ade754e009c3bbcae179dfbecc3f0N.exe

  • Size

    89KB

  • MD5

    8b3ade754e009c3bbcae179dfbecc3f0

  • SHA1

    1f8f1a02f28b86278107e67717833b35ab8ca4df

  • SHA256

    6f5f96945eb1488c8ed4bad9bc4fc55852a93520a7491568fcb7baa485d1fdd9

  • SHA512

    b4154aa5a4bab62c79b8ac6a9e959ffbf47700c65413cb9d9466626237958c30434d5a8dd854010154d7a075e549c30051968c6d21d713370621ddd0b24264e5

  • SSDEEP

    1536:V7Zf/FAxTWtnMdyGdyoIOIPwXwRsDTsDa:fnyGnCIOIPwXwRsDTsDa

Malware Config

Signatures

  • Renames multiple (4517) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b3ade754e009c3bbcae179dfbecc3f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\8b3ade754e009c3bbcae179dfbecc3f0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-945322488-2060912225-3527527000-1000\desktop.ini.tmp

    Filesize

    89KB

    MD5

    650477f224687fe974d6c7b14af19ea5

    SHA1

    cb701b13fbddc777dbbd6fd5537895cb1cb26727

    SHA256

    a575840bd5bea2afb65a4f97898995fdd3d6177e903b3cf971f063e42bebc3c2

    SHA512

    b812c90d0914c9a6f74b0c4dc80f51718ca9c554ecfcaaa9778957761e1ad8bb2180d305a35e4c21753819c4dc343be8c6840c628144123f29856b3b0494e736

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    188KB

    MD5

    500a35327960c6b73360dfb5b291c636

    SHA1

    21e0d699f13962ef46e7bf537b6a5a56604f6f74

    SHA256

    6c35a3d436dad247fcc34c0870afafcf29092239996e0d5100104909fe72ec0a

    SHA512

    a44912eef84b48c93cdcec1181ffe4edf48ff961e1b74b10facd424b28a5b1fe4ff159022cafb1901f565f439ae4cc43d863258324252760c3bf824ac8714e49

  • memory/556-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/556-856-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB