Analysis

  • max time kernel
    150s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/09/2024, 19:24

General

  • Target

    1c080bf45271a1368ecc61ddcf74c03609ab3480f2b6dcc29573a54b40829775.exe

  • Size

    28KB

  • MD5

    21270dc798de899a196d3e60e49c6977

  • SHA1

    12779ea88a58926e7444ec55990a19dd85f7a61b

  • SHA256

    1c080bf45271a1368ecc61ddcf74c03609ab3480f2b6dcc29573a54b40829775

  • SHA512

    6ca668aa4c5158bd79d3b973ac5a044e6fcd466846bb5d76217b5e2a0f8d6b0dab14d56967e2dd7f96a34251d704237c2b40f22e8daec467a87a5a357067a938

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9zkrMeIrSRkrMeIrSa:CTW7JJ7TReLeAeLeR

Malware Config

Signatures

  • Renames multiple (5213) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c080bf45271a1368ecc61ddcf74c03609ab3480f2b6dcc29573a54b40829775.exe
    "C:\Users\Admin\AppData\Local\Temp\1c080bf45271a1368ecc61ddcf74c03609ab3480f2b6dcc29573a54b40829775.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4892

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2718105630-359604950-2820636825-1000\desktop.ini.tmp

          Filesize

          28KB

          MD5

          f6ca7af6aa531c55ac0e6e3163f7c194

          SHA1

          b762d7170789266ae66f3394156c5727b3f1b5ac

          SHA256

          d0817d11ad83db1468d6d08b48ce0ce91f8fc59d27a797c2167772acdab094e5

          SHA512

          60c3672528257162be34c7fa70137cc2b4153f45419533d5660e43f67ca0ce579d268268e00a5a4f3f68b6606402b19b90ee42ee81932ee5c56d2fe276aff991

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          127KB

          MD5

          35f355f86883018c49728ab8881b5c7c

          SHA1

          80d0c17c12be18f7b23d7f3e73d71e1f57ea1216

          SHA256

          c0cd26da7035085881614b60a9b94e6e02ee3e411ee22b3c66931bac9d499cda

          SHA512

          f41d652fbbd2fba1a9d1c6b4465c61b57630e2fcc30571d57e5ee8f2af167e3d569ba74d0824a9c03eaeddcaad1260dd8e030184dcffcad58c338230bddcc02f

        • memory/4892-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/4892-943-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB