Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/09/2024, 22:20

General

  • Target

    62b3e97d529ee4cb0fad63becab15fc7fc94bc7dbe3d21b948a7d0858c45deb3.exe

  • Size

    31KB

  • MD5

    5b475ccf881bb48b6fc065c3c1599877

  • SHA1

    9d4abc453594ed37123074539db25d1c72a526dd

  • SHA256

    62b3e97d529ee4cb0fad63becab15fc7fc94bc7dbe3d21b948a7d0858c45deb3

  • SHA512

    cece0c6beaebe8cb01ea05301f98b93998aa15495b4f24c1613188e8d9582d1c78c05df7bb0a7338360dc339e94d3ae07a063c03501abfda7515bf371ede838c

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9uGeoGeU6Y:CTW7JJ7TkGeoGeU6Y

Malware Config

Signatures

  • Renames multiple (5195) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\62b3e97d529ee4cb0fad63becab15fc7fc94bc7dbe3d21b948a7d0858c45deb3.exe
    "C:\Users\Admin\AppData\Local\Temp\62b3e97d529ee4cb0fad63becab15fc7fc94bc7dbe3d21b948a7d0858c45deb3.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-355097885-2402257403-2971294179-1000\desktop.ini.tmp

    Filesize

    32KB

    MD5

    96416fcdcfc67913b0e6cc8ab322a185

    SHA1

    800580193ea24d9cb7b9503c9e77d152c42b6c62

    SHA256

    d4851f209d24b9cbe315a9a71529b87f5917528bab933b92ecb404dee2b77ca5

    SHA512

    f7f3ff45152e6399d1d36c24791da7b1bd869aa67e7c3030a55cabfd0eeaa9fd17d51a186e2501825a2eefe30342491c4d3555953f7db0852207c595122c3e65

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    130KB

    MD5

    6d5859b5411ce68e298964fc855f8b3f

    SHA1

    f186f2592b93ed1c55ceb5afd0cb3aa598636e40

    SHA256

    6d466f84b3522c3da1ee269b72f6b1a80f7f4fe568962c4d051bd4ccab781a5c

    SHA512

    78404168be8ab86752684bbe77b3764c04521cc9585400ab91ddf4d0d8aa2ea6a7bf40e1cae635226197c74b303e609b448875fd3ad17d4c074c9d258a151baf

  • memory/3088-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3088-968-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB