Analysis

  • max time kernel
    149s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 18:21

General

  • Target

    0b8cda682b56ac2b0f9366ce4fd24129baa90a49568652d6871a3283d60dbf15.exe

  • Size

    54KB

  • MD5

    9ca7aa1cd3879d4b87fb52ecffec0b71

  • SHA1

    fd6b5347d977a1597f144275fd2b6c72d6df78d4

  • SHA256

    0b8cda682b56ac2b0f9366ce4fd24129baa90a49568652d6871a3283d60dbf15

  • SHA512

    c5a52fefd43df0f8228e7673a00cacfc124bd5c4658801618dfe21eb3c011464999ce29ac799493799716fed5a3830a5058fde50f9119d4770fba6a7b77458b0

  • SSDEEP

    1536:V7Zf/FAxTWoJJ7TfUWWUbUgUgUhUWUbUgUgUhUWrCgmD:fny1jUWWgLLUhUWgLLUhUWRm

Malware Config

Signatures

  • Renames multiple (5201) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b8cda682b56ac2b0f9366ce4fd24129baa90a49568652d6871a3283d60dbf15.exe
    "C:\Users\Admin\AppData\Local\Temp\0b8cda682b56ac2b0f9366ce4fd24129baa90a49568652d6871a3283d60dbf15.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-523280732-2327480845-3730041215-1000\desktop.ini.tmp

    Filesize

    55KB

    MD5

    a165cfb07ca000b719d68893cb7934a9

    SHA1

    ed923c8591d131c62c048c702a63607509e49baf

    SHA256

    08574d1f3af7f45052baeed8e12c09e9f4373064895ef70306735500f1d08aa5

    SHA512

    1d52cb8e2ad3a714b8c0ffa6cbcd36f8eb85cecb3f54c2ed9f5f78c6de800a808acf92de5c6a1bbe51afa706bfd6e7c0d1033defcc373688d877a30c98d8aeac

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    153KB

    MD5

    f7bc362c8af64778ef8a3594a7d48539

    SHA1

    0275b48d889274b90abb6a9a751f55f71b454a5a

    SHA256

    7d3109ab44c5b867e8cda31b617c97d1d83846aab9dc35a7589c8af6d8e577f3

    SHA512

    b5f94046425e9523d2c8acf72ae6c4da0b058ec55e7974d5698ee6164c952ad43db4e5eaa2f82a0ea1b60bf9c2242b348dfa6a4856641cd0637af888f3506823

  • memory/2040-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2040-1012-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB