Analysis

  • max time kernel
    120s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-09-2024 02:08

General

  • Target

    3bf04a762a2e4e43b56f4c19ba2792b0N.exe

  • Size

    69KB

  • MD5

    3bf04a762a2e4e43b56f4c19ba2792b0

  • SHA1

    b2edf4dfaa6c101c1d8200af2f5c4024481cd569

  • SHA256

    0733c794968f0115fcae0d5454ba09a6421db37037ca6ae8a5cdb4723b72c3d0

  • SHA512

    7458ae6030f5dd4597776a75d4411b056fd8cbcf212f958613d084061d10099ffcd175055e506635965520c53123ef2af4a4a58f04ed58009e0e4264e0546a91

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rB:V7Zf/FAxTWtnMdyGdyktvtU

Malware Config

Signatures

  • Renames multiple (4670) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3bf04a762a2e4e43b56f4c19ba2792b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\3bf04a762a2e4e43b56f4c19ba2792b0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-523280732-2327480845-3730041215-1000\desktop.ini.tmp

    Filesize

    70KB

    MD5

    ee5bf6f25facb24f4fac63904c8d9ffb

    SHA1

    02dc621677e5835fb3f33a95def397095f128933

    SHA256

    0cf1dbdf6b630da384f0b9d010c1ac7f0db2c5d84f87fdd445c77dc4c8570805

    SHA512

    33ff501ba9441b6079d6054e7d43c5f76f3d3cc9e9a39a2360d04f4a5661c101b496e6c5007cd4a08aed7bcc651c75b368dec3a4859a7fb95371542d4d8bfc71

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    168KB

    MD5

    87c04d08f819092c044bf759f1bbed00

    SHA1

    1c56e6eb37381d838c88af6e6b1f6e13f2679aa7

    SHA256

    ddf33aec5fc0ab78d59a8bb48801cf368ff9e66a6bc871739824c3fe1d692726

    SHA512

    c7e69fe7fe0435d61c6db6deb16dde162d18bb99ed0cc682f2f2bb59c184b0ec687d389383ce5d3605f12f11555cc9d140126ae3d2faf22df87a5720a6627afc

  • memory/4820-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4820-916-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB