Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-09-2024 01:39

General

  • Target

    248c745c15bfc8080621b4720c531319d5dc1b7bab223b08e3dcd182d52d861e.exe

  • Size

    37KB

  • MD5

    4bd98c05d054e3c18bbd52e4cca440b2

  • SHA1

    ddec4823f8e06e0c7edeaccb7433cf11ff153b0e

  • SHA256

    248c745c15bfc8080621b4720c531319d5dc1b7bab223b08e3dcd182d52d861e

  • SHA512

    c66b5df787c02e3dc4139ca7a082aabfc87af251372be597f0547cb93c215ada1a8dda03386f310dd08c6e59502dbb40f7b4013653618a6ea30dab614d6725cd

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9Ro+QOViJfo+QOViJjjzjDHnHZ:CTW7JJ7TPU83PH5

Malware Config

Signatures

  • Renames multiple (5114) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\248c745c15bfc8080621b4720c531319d5dc1b7bab223b08e3dcd182d52d861e.exe
    "C:\Users\Admin\AppData\Local\Temp\248c745c15bfc8080621b4720c531319d5dc1b7bab223b08e3dcd182d52d861e.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-355097885-2402257403-2971294179-1000\desktop.ini.tmp

    Filesize

    38KB

    MD5

    98fd3ffaf1cd9daadcda4c7d1e882e0f

    SHA1

    dc46a171b688e6333bb8a73ff1ae8d00b9d23ef8

    SHA256

    60aac471da30e621529a852e3ec9cdfa6987fafaec6acab35ef9f15f7c9d8e18

    SHA512

    6d536f6246927bfb62bec9a8eeaaf832816e6dbfeda367ff79eafbbb24603c74b43bc7644556d3ac28f5a7f411b5befef027f1caede3a61284307a62efee998b

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    136KB

    MD5

    b3a0c27fe7ab844083608f9fef0bf2b2

    SHA1

    17929b0164964434e05e5a5219fc71a409c39bc3

    SHA256

    0aafc39558e0e64a5d4265d99b6f81c030df564c94f288976ec3be154cf9ab68

    SHA512

    737893b390667fe2689cf9691509bc88e88157aa86a976dcccc44f01911d3ee98d503d04dcb5a3c836b5325659bfb3324f9b0aa6a65e3ed0306181051a3515b2

  • memory/232-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/232-890-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB