Analysis

  • max time kernel
    120s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/09/2024, 03:04

General

  • Target

    bc301711647614228a77fcf6289923b0N.exe

  • Size

    62KB

  • MD5

    bc301711647614228a77fcf6289923b0

  • SHA1

    b26bb708a61d0746e7c51c522fb31055c408f4f9

  • SHA256

    c6f0396e8606fad5dfffbf2acd515a0d2595034cc173c6d0e22411e36dbd2450

  • SHA512

    786dea074802e8b39d4c1223898ab5287197f1bae4f41d112b91f35209994d2d3dce47be06813bb930d4b5a6d519fa0b753e0117413d57e3681f74dbb485089c

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rP:V7Zf/FAxTWoTtvXtvU

Malware Config

Signatures

  • Renames multiple (4656) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc301711647614228a77fcf6289923b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\bc301711647614228a77fcf6289923b0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4964

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2392887640-1187051047-2909758433-1000\desktop.ini.tmp

          Filesize

          62KB

          MD5

          9073f8cca38d8e82e5eb62d763ffe8cf

          SHA1

          135ae06e2812403315253357794a93d7ced1bdda

          SHA256

          bb9ee4cd762e57a7d9ebbd90888fc4f0d00d3886846172713c80e66619b0af17

          SHA512

          048cac18ddb9a4dfa4c4c02947ff5e56e54904e1ec13047ea0375297a502a9a84c975ef0033c102575f0739e1fd0edd2379ac4bd7bb163630c813175139ba7b5

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          161KB

          MD5

          2561afd00614d9d04928d1f577de5384

          SHA1

          dd2efdf216e1462c86b1866e01396cddc6c885ac

          SHA256

          9e5c996366649393aaea867dee8be1b7f749e16d2efe6bd05b34272724f3e58c

          SHA512

          b127cc6a128456883c0266f1b4c784f5e8002c504b0c6f1e444870db7585341afe2a312b62d9a8d7c1474c01a683a50e1a38cffa185b8297a67d26435698e474

        • memory/4964-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/4964-902-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB