Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-09-2024 12:48

General

  • Target

    df308da391da6b0a85fc13d2cf88d8ca7f4a0f19ee1d1c6d6e5dc023e7dfa223.exe

  • Size

    32KB

  • MD5

    cdc2b1ae1dcb6645e4405de587bfcae9

  • SHA1

    ee1250442cc63757b103a5addd6bde294321786b

  • SHA256

    df308da391da6b0a85fc13d2cf88d8ca7f4a0f19ee1d1c6d6e5dc023e7dfa223

  • SHA512

    2d6c241d89488c38f7164e4999476d1fcdd541b0bf6a56b333eaf1e32d4392cad1f66e9d6dec48d73e71eb09468b15b09582c4545816a3c9585f28ee4dc8ac0c

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcu90TKe+0TKer:CTWx

Malware Config

Signatures

  • Renames multiple (5047) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\df308da391da6b0a85fc13d2cf88d8ca7f4a0f19ee1d1c6d6e5dc023e7dfa223.exe
    "C:\Users\Admin\AppData\Local\Temp\df308da391da6b0a85fc13d2cf88d8ca7f4a0f19ee1d1c6d6e5dc023e7dfa223.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2718105630-359604950-2820636825-1000\desktop.ini.tmp

    Filesize

    33KB

    MD5

    45f2f125f98bd96bedc1881ef194a82d

    SHA1

    900b67419e70495269528d56d58ad1102b16a960

    SHA256

    4958b3dd7d4c84c7754de1e524f792dc8f672bbaf6ba9f39c9b75b63017dcc61

    SHA512

    f4822449e2a53ff375e1992bbcd83e67f07c465e3f94e1735a41e49ec5c5f5569c1645c51ff9e47bf8e4e03595f46edd8db05d470af83859ad2e7eff61999d86

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    131KB

    MD5

    bd3f0d0a81422e5b7a4dc22cfe251c5d

    SHA1

    6081e710b3fd532194bc15a688e11f40380a18ec

    SHA256

    8c0b9bb1f880a89d357113e0a3b0dbc3fada531a20cca5658cedd6b44962e8a8

    SHA512

    7bd9b970876621dba2242a5b9bbb04126734d4b193b6f1d3ff7a39c7d546733d0d360b084dafe428812c545fa92693a52df65e65c62fc7958d5b32bf71617a6d

  • memory/1792-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1792-909-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB