Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-09-2024 03:54

General

  • Target

    ad12de278a0ec6253e387763e66caf464ad2bcd50e210bb17d5b37949b38f5b1.exe

  • Size

    31KB

  • MD5

    0a274f0e80259d52ce00b2f116fa9b81

  • SHA1

    c509a8906ba26e773a48884e4c4e00fb9d3c8308

  • SHA256

    ad12de278a0ec6253e387763e66caf464ad2bcd50e210bb17d5b37949b38f5b1

  • SHA512

    3fc97b9c4a801d657e9589c0575909b3afeff2502661d353e6b8fc5e987703c1750bef01e37745ee2e1223d273ec6977ae2eacefabbf64456fce900449484b3a

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9nj40g40T:CTW7JJ7TJLgLT

Malware Config

Signatures

  • Renames multiple (5296) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad12de278a0ec6253e387763e66caf464ad2bcd50e210bb17d5b37949b38f5b1.exe
    "C:\Users\Admin\AppData\Local\Temp\ad12de278a0ec6253e387763e66caf464ad2bcd50e210bb17d5b37949b38f5b1.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-945322488-2060912225-3527527000-1000\desktop.ini.tmp

    Filesize

    32KB

    MD5

    14ec03acfbe09a3a71d53e7036d648b6

    SHA1

    fab1534757ecaf3463d6a98e44806a2504ce93c0

    SHA256

    ca55bf69592c52498ec429a340df3d4bc169791c7295a4bfd4354185190c1c33

    SHA512

    fe8bbcb337165706519f01dcb17de02e3dc19c47625672c6ddf670769354fadd8af8dcdaddf4610d86c53ebbd5ddf8b820a981c72dd19a573f6df71adf40f186

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    130KB

    MD5

    45aa80dc121a307a7fefa287cd1714eb

    SHA1

    a17b17f898b2007fcde4c757743ea17f178486b2

    SHA256

    a2bb138314b1e4aabe8d0b7c99f5f26d7bfa3c7b016c10dff3bdf124d1fdacf7

    SHA512

    6006a45a0e18b556150c5c8f73a284e40d46005a10c7f5643b075597037942f879dac1c0680774de13a1f1d2707715edd7b6f23d89c7ff499686245d0e80efdf

  • memory/724-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/724-1006-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB