Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/09/2024, 03:24

General

  • Target

    8a90fcba327f268be0eeacea2623ac551aea560a5c009f284c125b73b363e445.exe

  • Size

    1.1MB

  • MD5

    e0b4ea2100614c387831754f78610a5c

  • SHA1

    3462cf50d4b6fe4fce6a368ad4318b43444a046b

  • SHA256

    8a90fcba327f268be0eeacea2623ac551aea560a5c009f284c125b73b363e445

  • SHA512

    8108e4cb8a137d6f46859b2b9bcb3980d565911462292ce777b9f6a1eedce986fbb6c671ae3c5c04df1d665f4fc144f633e937da431d0061966be32f54f5b29e

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9lBT37CPKKL:V7Zf/FAxTWoJJ7TdTWB

Malware Config

Signatures

  • Renames multiple (2089) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a90fcba327f268be0eeacea2623ac551aea560a5c009f284c125b73b363e445.exe
    "C:\Users\Admin\AppData\Local\Temp\8a90fcba327f268be0eeacea2623ac551aea560a5c009f284c125b73b363e445.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:796

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-945322488-2060912225-3527527000-1000\desktop.ini.tmp

          Filesize

          1.1MB

          MD5

          2ad6db4ef21ab46ce2dd8939edfb457f

          SHA1

          d17182e01f1bfd97016f3862b7804f336c02e6d5

          SHA256

          4d24ec089b7fbccc970eecdae9cdd449c255d33c74bbd3eed1ec3fd6bbaf59ea

          SHA512

          6856655097fb03b6bb53fcc74dfe896537fdc30ddeb2587db3c0fd9e24dc15b226ca7e4c7f6c978594d10759fc20460bcf75affcef25a604255aade3d0bfae32

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          1.2MB

          MD5

          5cb4f522b54b022569fc4132e5d72c9e

          SHA1

          629bd1201e5dd25ec89e46be7a5345dd6a2f7938

          SHA256

          82a27c99002b15e63bd4133a36c054809e48937694d456432ee3c52a3fdac6bd

          SHA512

          207dcfd8520e330c087db7dadd70928ae7a41b92df10f8773f9776276ffd8d6dd266fc1d5154213d4d44604784664d212d6459babc470ea98620e9ceadd0f302

        • memory/796-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/796-336-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB