Analysis

  • max time kernel
    120s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/10/2024, 16:55

General

  • Target

    09028adc5dc55946fa6533acc6a2be201397f7d389d8ca0e8f87d567dde48b90N.exe

  • Size

    80KB

  • MD5

    b34bcf3fb6d06efb396c91cac8e49740

  • SHA1

    c50b37b49d292e291b2c7fe1fc33efa3812e1b75

  • SHA256

    09028adc5dc55946fa6533acc6a2be201397f7d389d8ca0e8f87d567dde48b90

  • SHA512

    a925824bf5fbe1ffbb306b55c9080c3a207448fe52fdb34f037c75de888bbabb68ffbb820ed593d026ca8005bb15ab33d6e6e59cdc4ec2e7d58205e27a829d5a

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKK0SjHm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/S/:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Qj

Malware Config

Signatures

  • Renames multiple (4663) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\09028adc5dc55946fa6533acc6a2be201397f7d389d8ca0e8f87d567dde48b90N.exe
    "C:\Users\Admin\AppData\Local\Temp\09028adc5dc55946fa6533acc6a2be201397f7d389d8ca0e8f87d567dde48b90N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3400

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-786284298-625481688-3210388970-1000\desktop.ini.tmp

          Filesize

          81KB

          MD5

          e58b5e935fb9c885132489a45f49f44b

          SHA1

          699f13514a1aa0325e98a32accf2b9accc82f15f

          SHA256

          d263e53c59b2961b71e767a48e38f21df8770da1d6dc9a540f2c32bd4759db86

          SHA512

          e8eb227cf9ad3ced0cd85ed347e2c9e7d9578698894107f848af2bc4c90c65ca0af86b274b24710c2c8fe6a8e947b8a591aca9e6eec3bcb290b2ca03db73941e

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          179KB

          MD5

          1464309d92fac067f32bb1c4faa76cf6

          SHA1

          2912a93f8afdd0c17b3b03d5b31f24e8f138b239

          SHA256

          aa190f9b6f549fc92199311126eaa20dd5bd32585e84d37b87a1c7248e127470

          SHA512

          7fcc6392b3f42a6b52402525248e69527608055c368a3de31824f4ee46e32522234bf19d00097d6bf0c7086f8b9d220f36fac419eb8c42b8eee85c97283a0dec

        • memory/3400-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/3400-908-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB