Analysis

  • max time kernel
    120s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/09/2024, 19:09

General

  • Target

    f031e8dab3f22c0f13d03b15c312134a223af5029dec4c6ff8befdc37a374b48N.exe

  • Size

    52KB

  • MD5

    578e9513c4234360de538d2f9567cf70

  • SHA1

    c9214d058aad6f0b56e43cb755e1da80f97a9d36

  • SHA256

    f031e8dab3f22c0f13d03b15c312134a223af5029dec4c6ff8befdc37a374b48

  • SHA512

    0001a6d08ec3cf158c888066167f86baf03034a8fb1c8dd7a974cfa9c885b3bc8435c6453f32f11bb70e5e4bd7d80637c8a1366f73e394394710bab5de315b90

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9hnw:V7Zf/FAxTWoJJ7Ts

Malware Config

Signatures

  • Renames multiple (4639) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f031e8dab3f22c0f13d03b15c312134a223af5029dec4c6ff8befdc37a374b48N.exe
    "C:\Users\Admin\AppData\Local\Temp\f031e8dab3f22c0f13d03b15c312134a223af5029dec4c6ff8befdc37a374b48N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3288

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-656926755-4116854191-210765258-1000\desktop.ini.tmp

    Filesize

    52KB

    MD5

    04a1dbea68e028504e27bcc72c3b1714

    SHA1

    7d9a143bfb89823ab90e13b3c63b243b5cd4e960

    SHA256

    a16920266cc9479df9918d27cdf40d49bc84233c098e33e20479fc2de9fec67f

    SHA512

    a8b78f6939f6b718e8d9111382fb10cb7626335eb019f0b01296502644ba1953222015de5b876aff1bc4a5704f22f7ba0793e1d2e19bf189dfd11b4192a75ed5

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    151KB

    MD5

    76379c52fc786c33cc61a002cddc6118

    SHA1

    4fe7ca61d6ee2568f6f5d3fd3b3544802f396aca

    SHA256

    39e46fe9112010d4b2ad326454ae6e631c22da773cad7e6795d418f9fce7d7b4

    SHA512

    b5ea3fbc0e9f614cee7d63d3bf5c0764071b14bc621a4e0ef32219ad4405370944ff17f553db1bc6c1e88993c841373c64c1ed0d12a4984a43ec34dd6d35708a

  • memory/3288-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3288-870-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB