Analysis

  • max time kernel
    120s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-09-2024 08:58

General

  • Target

    39e90ab5ef6f98bde273d4cf3463fd30N.exe

  • Size

    66KB

  • MD5

    39e90ab5ef6f98bde273d4cf3463fd30

  • SHA1

    146cccc1314f748b1ebc3338245074796487e543

  • SHA256

    1200a049c7661c65c8abbcd0ca7dc6b3afb2d760625aa97c3fc0c8b41bdd5954

  • SHA512

    1e5a691b5eb3a18e10e389e5c0b840245d91286bfb8c70fb0cd90869db779839c04903b7ca28d712b3547eed5a9dd6e6e946c357c6ac3f1958e7ba3fb691b3c0

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFzZ:CTWn1++PJHJXA/OsIZfzc3/Q8zxY5a8e

Malware Config

Signatures

  • Renames multiple (4638) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\39e90ab5ef6f98bde273d4cf3463fd30N.exe
    "C:\Users\Admin\AppData\Local\Temp\39e90ab5ef6f98bde273d4cf3463fd30N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4182098368-2521458979-3782681353-1000\desktop.ini.tmp

    Filesize

    66KB

    MD5

    83e4666bc1d68d26d891bcc876a6d836

    SHA1

    64aa78f746546ef36cdb740be41889affb5aab09

    SHA256

    bcb142c8b7b938c4b370aae4bdfcac834ff84b990cca49fde98a64ca30c398a4

    SHA512

    ae3dff7bbd0f0439a5a3ac9eec78455cf98dfd67078e79e184fbb7d1f180f975c8ab6e916ac18ab7e92391e32d86bdfecf9c486b6ac8bc0a571d3d83144ce7ee

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    165KB

    MD5

    d46c0f587d11abded264c840d2841039

    SHA1

    e27c9059290e82bd7987b413c96aed5830fee4fd

    SHA256

    8ac97730243c036e4f0275a4c2357c3175eee51ea923929db0772b138c44c4ab

    SHA512

    4aba17cd2a87b2024198a5d49c2223690f708666d3ec0dcc3ffcbe9ec3b50d974c3b23fcb7c3359fd40429c5d2ebe0d3b8381396bcb50183586a601a0ab61a4d

  • memory/4120-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4120-855-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB