Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/09/2024, 22:54

General

  • Target

    7035ed464e3e47e70c2f47a3509f1b4fe6dc936dfb4c0b4301734dae4ca6196f.exe

  • Size

    48KB

  • MD5

    29f6b0e9b91e3c965cfbb1e9fec98eba

  • SHA1

    59d65cc3a3c233bd4d814a75191d72563fabca7b

  • SHA256

    7035ed464e3e47e70c2f47a3509f1b4fe6dc936dfb4c0b4301734dae4ca6196f

  • SHA512

    dd35dfbfeae4546614e0db4ae41bc1280afb8b99b7abf49fa8d8bc7f89665221989bbb92af357dac6d5dff4d4419522f71102d392fc4b9bb47ee533aadfc6da8

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI99:V7Zf/FAxTWoJJ7TP

Malware Config

Signatures

  • Renames multiple (5190) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7035ed464e3e47e70c2f47a3509f1b4fe6dc936dfb4c0b4301734dae4ca6196f.exe
    "C:\Users\Admin\AppData\Local\Temp\7035ed464e3e47e70c2f47a3509f1b4fe6dc936dfb4c0b4301734dae4ca6196f.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2596

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-523280732-2327480845-3730041215-1000\desktop.ini.tmp

          Filesize

          49KB

          MD5

          a1291c0ee4e90f55d45431abe7360bda

          SHA1

          c2c3e4fdf2cf66444f93a5d627a54b678fc6d25e

          SHA256

          29c77956ac8ea8cc9ccf27db862f6bb6be0485c839ca4e82148d69a7ff5d2f7f

          SHA512

          c2f47b8ee2c3f2a516eccd3fe0e2c6240ba6ef3fd4ee1f65368a8ab3db3f1bef5d08af7964a019b11cd6fd17c83f1aaf0530406d37a56282cba3011695539e2d

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          147KB

          MD5

          724e19e867d2ef722c7689328ed03cff

          SHA1

          6e1060a368accce6579b9c8d0c7ce27719d0f19e

          SHA256

          886866b68465cea66eebc35aed0fd33a37f630d5179c5f671338af46c1e356e4

          SHA512

          0c245b04c811b1da5e049a54f00a2721442c87f1c5e9a90722518cc5c0763978404ab13d2e98177cfcf24343414029bf54025835024214dcc2919f498e00a379

        • memory/2596-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2596-942-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB