Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/09/2024, 04:06

General

  • Target

    f495d69c6df22d65175b5978cfcd746b502d024ff778e1643a2cf2863f28da4d.exe

  • Size

    51KB

  • MD5

    8e5e2373863984b70e647cb4f7c0c3a2

  • SHA1

    190944fafd4d2898ccde3e5f2546dcaeda42a080

  • SHA256

    f495d69c6df22d65175b5978cfcd746b502d024ff778e1643a2cf2863f28da4d

  • SHA512

    5adb81c1a452c39b7c555eb853c5dc604995e51c97df1d52eaea6aa4f91f11b73e82bd1ec403e077e5cb4150eaafd2cb25e3652be5143463c59d6e62892b0d3f

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9B:V7Zf/FAxTWoJJ7T/

Malware Config

Signatures

  • Renames multiple (5031) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f495d69c6df22d65175b5978cfcd746b502d024ff778e1643a2cf2863f28da4d.exe
    "C:\Users\Admin\AppData\Local\Temp\f495d69c6df22d65175b5978cfcd746b502d024ff778e1643a2cf2863f28da4d.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4488

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2412658365-3084825385-3340777666-1000\desktop.ini.tmp

          Filesize

          51KB

          MD5

          9bf7294dfb1daaf434dc28ea82d1c6c3

          SHA1

          00afdcbd8504563e3e45eaac2e2d2652b2d921fc

          SHA256

          2e9bb1526d304cdf60991d2a7dfc9f089d7194b1c4bc8e66461126c5a01ec222

          SHA512

          d7dd6d6b306a7718c50e49851f964c79848bbe7877da1360ec421ead400b6f82f8a696077ee8dd235093103e0153c477ae1bc4e8a93515c5dd0dde1f1063459d

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          150KB

          MD5

          169901b5ac3ff38febd528bcba152937

          SHA1

          d8ba99158c843f0d6f64dc349a269df523c1f34d

          SHA256

          fefed90b77c7521a75508e4b7fcdf302f2af5049229b9e5ead1b58c7c5976b28

          SHA512

          e215ea577b50e6f5a2d94601260b81ca909d64b6b31852fcde51993a4c3a65681e45f90f56d036cdbbd0cc21480ab45407db84d95f6c31db08aef7918b6b4ab6

        • memory/4488-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/4488-866-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB