Analysis

  • max time kernel
    150s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2024, 17:54

General

  • Target

    3656c417dfc3ecf5fc08138bffba4c91faf5f38e3d09ba1c69c3a82e5dae96bcN.exe

  • Size

    56KB

  • MD5

    e5f041279a1020f2c184076d4b90ab60

  • SHA1

    0c8846dd8d28f951cce213996c696b1c50664b1f

  • SHA256

    3656c417dfc3ecf5fc08138bffba4c91faf5f38e3d09ba1c69c3a82e5dae96bc

  • SHA512

    5cca46e22712d7565408400b5308621507b6d75b4c4798b0a3936be39f49c382aec5ee5bac46a8acf491eb851796b732e19528ac7a54a5d3bd8d8e96c32a36c1

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9O73Qi1xu73Qi1xP:V7Zf/FAxTWoJJ7TM7336733r

Malware Config

Signatures

  • Renames multiple (5190) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3656c417dfc3ecf5fc08138bffba4c91faf5f38e3d09ba1c69c3a82e5dae96bcN.exe
    "C:\Users\Admin\AppData\Local\Temp\3656c417dfc3ecf5fc08138bffba4c91faf5f38e3d09ba1c69c3a82e5dae96bcN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3284

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-355097885-2402257403-2971294179-1000\desktop.ini.tmp

          Filesize

          56KB

          MD5

          03412b34d12ebd3357db2283048d28ad

          SHA1

          38dd317afb8995434c2afae2570e5feb8b17d992

          SHA256

          5819830947090c53fc0644ffbe397affd77cee3681925b3af3def0969ae4840a

          SHA512

          1c610bfb861db5b59bfcf470a15b1a0b395df0fdd683cabfc19f0466fca774d9e4be090c6f6e74c174eef4fb2f8e543764685b3d44b3600609a868b58aea0de3

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          155KB

          MD5

          be5dcd2bda593cbe7da62c3c372e7fdd

          SHA1

          058052a71964a58de9f112eb8617041f6d139576

          SHA256

          de811814fbbc9bf62aec4e091b2eeda449d6e0dcc711ee470d37f6d8d8490980

          SHA512

          250acefe224b1abcf1e39d091e6e1d484144995518225b1635cbfc9b7670c64d72bcc7b44f6b48ad611196b7e439feff8642515cea842be0905ef6df2698ded7

        • memory/3284-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/3284-906-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB