Analysis

  • max time kernel
    120s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/09/2024, 09:00

General

  • Target

    7c753e72d974035d2a3b9d112bedc38f3764253f6b250ec16bc94f02ac808850N.exe

  • Size

    36KB

  • MD5

    d2a6439579970f88922770db7c6b1420

  • SHA1

    8c274a34b2de8479100323fe2bd21f428bef51e7

  • SHA256

    7c753e72d974035d2a3b9d112bedc38f3764253f6b250ec16bc94f02ac808850

  • SHA512

    4b01573cbf3ce01e27d205e73122873f526585df9b880a1504ec5f3f21c5f74f876240e84df9914fd8ff1a37d7ed9060b73daddb7a681a5f69942b24f4a9f8a8

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcu90TKe+0TKeUAmQ:CTWLmQ

Malware Config

Signatures

  • Renames multiple (4655) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c753e72d974035d2a3b9d112bedc38f3764253f6b250ec16bc94f02ac808850N.exe
    "C:\Users\Admin\AppData\Local\Temp\7c753e72d974035d2a3b9d112bedc38f3764253f6b250ec16bc94f02ac808850N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2718105630-359604950-2820636825-1000\desktop.ini.tmp

    Filesize

    36KB

    MD5

    e9ec27ef7f3efa28b8769e9e86cbb074

    SHA1

    3586b0663128c43a29c6d3ce044145049fc0eb74

    SHA256

    8f63829a1f8fa3fc438ac6bcd464d66c00bb204095ce7173eb32ad33e91de68d

    SHA512

    69c4117d1309e7d62b9b37a3978af3d6741b0595ad02417232cc1aeaac9f7fccb61f68708f4e7f4da32009c09539a13506c8d2012d0636aee835ca536a0e5c61

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    135KB

    MD5

    fbdb804b9fb17aee23c74fb735d63c47

    SHA1

    edc30dd36f251a7dda57a0ab2c00e7c831d5bf25

    SHA256

    49a7ded6f90fa9a82e4344675791b230c2a62c098d246e3c597f32439b6cfd66

    SHA512

    d6cd196e5c4811e50443c52cd5a082507eb905a60fad503bd4097f203e5edd25ae5a5014c565ca72724c22f0e8d94fdb72b2da673483a9c311a62c166c72200b

  • memory/704-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/704-963-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB