Analysis

  • max time kernel
    119s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-09-2024 12:30

General

  • Target

    676e27454f71bd8fe77e1e266a30cac0N.exe

  • Size

    29KB

  • MD5

    676e27454f71bd8fe77e1e266a30cac0

  • SHA1

    8a7e6ecd9efb26a1b649d3f84aee071224c5d397

  • SHA256

    0bec07b74653535c1ae0ae2f2ecb2ae94d100fe3aff8686fe7bc002cea317cb1

  • SHA512

    1089790c8ba11dcc2abf2d4a9da9a246c9671abbd65e89d2701db61da938c68edbd9147e3338d5e139174ad097f207e589f63f75d1370e817269f819b599413f

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJ1Evd5BvhzaM9mSIEvd5BvhzaM9mSsxmMxm9+9ZJ0:kBT37CPKKdJJ1EXBwzEXBwdcMcI9ZJ0

Malware Config

Signatures

  • Renames multiple (4671) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\676e27454f71bd8fe77e1e266a30cac0N.exe
    "C:\Users\Admin\AppData\Local\Temp\676e27454f71bd8fe77e1e266a30cac0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-656926755-4116854191-210765258-1000\desktop.ini.tmp

    Filesize

    29KB

    MD5

    c71b658873b92be8c91ecefd210cf2d7

    SHA1

    c5f56f28c3da0dbce821f61db156882896800af5

    SHA256

    f06576a4d83c9823a7705db91e4c3b517155a85b5a7544548e2f11919b66301a

    SHA512

    7741b818b3466b2bc26cb32e30db1a88cbc53e7a5a35ddad31f29275763ff348d7e52145f75efca41111565d44fc5274bff08e71a4df328e763d009ec084dee6

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    128KB

    MD5

    d7675a163162deb4ec318fc34ce3c52c

    SHA1

    028e2c82d013a51435acfa8ba113661a4074e1a8

    SHA256

    5950736d5a638082a162248be1599773fac022a141459bcfbc9dc7fa18726b9a

    SHA512

    452f0e6f65894247fe2f5018047421caa0000c14dac8563118169548d65d6c4ef6e716f1187f4cdd010cbf942ed57d2ff8860c1b29f3bd20f50ce02af7b901eb

  • memory/1280-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1280-1039-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB