Analysis

  • max time kernel
    150s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/09/2024, 01:47

General

  • Target

    a7e31208751f76edf597bee5ac6b3d54d35929af5631400cb3eb7560ec92d211.exe

  • Size

    24KB

  • MD5

    27836c404a2bf15dfe3fdb4bceb36989

  • SHA1

    85f05a69a46b7fd350303cf3138700924ccf4d12

  • SHA256

    a7e31208751f76edf597bee5ac6b3d54d35929af5631400cb3eb7560ec92d211

  • SHA512

    bc9ced83e380cc97162dbb8fa3d53a62fc8d15478360a54f9c9b74891d2d031321bbdac88fc44d0ce20277aee7116feaddc4e127a7406155ea31f1accb2cca2a

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJ1Evd5BvhzaM9mSIEvd5BvhzaM9mSsxmMxm9+9Es7sO:kBT37CPKKdJJ1EXBwzEXBwdcMcI9L

Malware Config

Signatures

  • Renames multiple (5195) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a7e31208751f76edf597bee5ac6b3d54d35929af5631400cb3eb7560ec92d211.exe
    "C:\Users\Admin\AppData\Local\Temp\a7e31208751f76edf597bee5ac6b3d54d35929af5631400cb3eb7560ec92d211.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2412658365-3084825385-3340777666-1000\desktop.ini.tmp

    Filesize

    24KB

    MD5

    f55886be4a6e48b64f6bb661584228e2

    SHA1

    34a9bf611ff201b1a7e3861dc6907a167875a352

    SHA256

    9eb87ca07b70f89bea0fc9a84bdb3ca6b0427d0a47baafa33a4c774a53b12b98

    SHA512

    3bf367a409f2c04c8da1d62ddafe036775bf499b162a13880ecc8bc5aed6886f8a605e7f6e602addbb52642ed281d23e4529f4d213e5a9b9e48cf07d3982533e

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    123KB

    MD5

    c8b8705fb7c278b75c07dea1f6c4eab8

    SHA1

    c79aac983d6593880ba5efc43f821422c5a341d3

    SHA256

    15b8e2823c67af3da24b331a940f0ce26388410f416f385484b5cf4ed6ad7ad7

    SHA512

    7b7a51bcf579aefba9b4faeb00625f13ef7216f6e755cc13d34e83cb4f9917c216800181a88f0aeeb1a537af1425bf93a31c64766323eaeaad1489742dedc801

  • memory/3344-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3344-908-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB