Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-09-2024 04:06

General

  • Target

    b93273c3aa8b3a779fe53baf1edbfa35d6aebf23c28a787219d364eaa33f3abe.exe

  • Size

    81KB

  • MD5

    3837c74ecdcdca54d182b17aa48a0d19

  • SHA1

    a655eb7b01e4454dc356cc03a3f3161b1e3246e0

  • SHA256

    b93273c3aa8b3a779fe53baf1edbfa35d6aebf23c28a787219d364eaa33f3abe

  • SHA512

    8e954c90aec62be35cd7b9cdd749e8a3c4c1b626f2e16e6fb00e19e0c8720beab922ba9fef501ed634e07d3b84e9ade821e9dac78dc0f07ada8c1977a2bddb83

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9B6r7BT37CPKKdJJ1EXB2:V7Zf/FAxTWoJJ7TOtTW7JJ7TOF+C+r

Malware Config

Signatures

  • Renames multiple (5032) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b93273c3aa8b3a779fe53baf1edbfa35d6aebf23c28a787219d364eaa33f3abe.exe
    "C:\Users\Admin\AppData\Local\Temp\b93273c3aa8b3a779fe53baf1edbfa35d6aebf23c28a787219d364eaa33f3abe.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-523280732-2327480845-3730041215-1000\desktop.ini.tmp

    Filesize

    81KB

    MD5

    61ca9fd52c8b05932f8c1919001109f0

    SHA1

    5bb3c72ca031e4f79df69a4f40f9e18fc2dc9c75

    SHA256

    d0737b2ad1e85c88cddca5cab9f8ce37fd785fac5f0bfdb4debc77c91b831ac1

    SHA512

    e3564500814737589b60c2b1eacecbd015968838dc8f6dbd14512548587b36230922311b8ee70188ab08d591876d0a2b216095dda5086d2607054f2d5c2c11e6

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    180KB

    MD5

    33430ad0901d88700c00268954d4e822

    SHA1

    46c775d72a4cb9d14cdb4d872c45cb0eee9bbe05

    SHA256

    cad3e9da529bcba7bcdb16472aeefa8c29ffdea30427855fe4e9f91acc539721

    SHA512

    46abeede1a1aa95c0adf7c00d2e57b32310771d1a21d99b05b595105a77f37955dfaaf8ea4721befadbc886d9463347d1e1fe1adfd34d0f9f032a163e371e37f

  • memory/916-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/916-860-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB