Analysis

  • max time kernel
    120s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-09-2024 12:37

General

  • Target

    b23913897970621e035379872fb4f560N.exe

  • Size

    53KB

  • MD5

    b23913897970621e035379872fb4f560

  • SHA1

    dc646e0ca2e83cc7c97f32db29049730a9423ae4

  • SHA256

    f43293b3b793ec7e897c7cd8950e6e2251cb0261782326a298c4fd946f5f0e85

  • SHA512

    6d41da545d4abddff0e53549c798cd942a1e30d500c839036ec87ca03f1542e162d1227422be76ba56bd11366b2e0317335ab661878630210cd843d883ec2e15

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcu90TKe+0TKeinMdo:CTWUnMdyGdy4AnAP4FeUea

Malware Config

Signatures

  • Renames multiple (4652) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b23913897970621e035379872fb4f560N.exe
    "C:\Users\Admin\AppData\Local\Temp\b23913897970621e035379872fb4f560N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2392887640-1187051047-2909758433-1000\desktop.ini.tmp

    Filesize

    54KB

    MD5

    93e68ee7078b828047960ae05f9871a5

    SHA1

    3a816bf8275891d22052415315e989d1bd4c25e4

    SHA256

    3eae2a025c509844b10d27f10aa3ef6d20f6726872efb74f9ae43a72638268ae

    SHA512

    bfe527652ebc6e2e8861d8ef7e6d39c153ddb0d47b146a501d54ad3de82ccaf8adc8e73a79cf1c6ca4ca9eb5b0749359ff12a13c152f019aca8720a84069c81b

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    152KB

    MD5

    9d0550a10ae991d7b50160d3f2e5b1e1

    SHA1

    d8ec308bc91254673be1b775d247e6d5d11676cf

    SHA256

    52440f1898a3e43eac9c8d585d83ceaf24ffc2b4c53867e1d2de13f065f57ff7

    SHA512

    d1aa774e512805fd0dda0155f50c08eadac1bcba9135c5218287f55bcebf6886df7d953107daa8f98988b9d6091a1988ad4e11377cd60eb7531b6b67f24e3099

  • memory/4752-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4752-929-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB