Analysis

  • max time kernel
    149s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/09/2024, 21:53

General

  • Target

    579db8e7374c712cfadce350430a97e5af3c177e6963b22de6b91c734ddd779e.exe

  • Size

    125KB

  • MD5

    1380fd91dbf3808d3f7a6836227d0c7a

  • SHA1

    d752e7cf7443095141d2d7ea047fbd3d47d27def

  • SHA256

    579db8e7374c712cfadce350430a97e5af3c177e6963b22de6b91c734ddd779e

  • SHA512

    2544ea6da48f4681078edbe66a9fa2a212384b63e83dd8e489d967882cddec497327885d9d9deda4649728f27f4a66a6a680d7fea6e83cc3d9b70224ca1c15ea

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rY:V7Zf/FAxTWy

Malware Config

Signatures

  • Renames multiple (4849) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\579db8e7374c712cfadce350430a97e5af3c177e6963b22de6b91c734ddd779e.exe
    "C:\Users\Admin\AppData\Local\Temp\579db8e7374c712cfadce350430a97e5af3c177e6963b22de6b91c734ddd779e.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4182098368-2521458979-3782681353-1000\desktop.ini.tmp

    Filesize

    125KB

    MD5

    28166a8c95e29d9e73f46ee2e7042053

    SHA1

    a92a0ac148427dc22f9e2bc560f6903dcb0a376c

    SHA256

    2549870a85026d6f872d51c4a9baa04464c5212734de0f2e70a88e6b51003ce5

    SHA512

    1d1dad1e6bf2e1a5f2eb1c571c0be690f507622b4d7e23759157c57d3a216ac6286a35e0f0fffe7a9fd62e386ecee57f1026fe5495e6dcee27ff63e0b35e6ecf

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    224KB

    MD5

    63d09f6227fafce42c86553b149e5957

    SHA1

    b39ab954471577f7aff8ee75cc0df8945ce9f640

    SHA256

    007be4189829329a728af8f5b0f30c07b5c8b6a2c408202a0f97e4ff596fd003

    SHA512

    d926081ab048070722caf703df77c07098b892e2649b3674a05b76de252d7ee467beb4e6dd2f44899be78dde0bebb2279b2afd9934c23eb5bd83eafa233cf918

  • memory/2976-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2976-830-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB