Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/10/2024, 02:49

General

  • Target

    bcd25d6386335a8de343a53b712fee10409086cd9efd40210d84d20e0b159be5.exe

  • Size

    58KB

  • MD5

    64bfbdc7e5d8d54a3ca13afcd7158c63

  • SHA1

    540e0b2f7856dda939280571e8957012399c7e4d

  • SHA256

    bcd25d6386335a8de343a53b712fee10409086cd9efd40210d84d20e0b159be5

  • SHA512

    61194b1762288298a5713c0872771fbca00d16c6b19281915511099b59b0a7c83c3e2810363ffca5374fcb0377187ae5b74e3af481ae079ffbe6f8592ea029ca

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI97jyjWEWAnWAl5eiW5eiJ:V7Zf/FAxTWoJJ7TtyvtlDWDJ

Malware Config

Signatures

  • Renames multiple (5163) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bcd25d6386335a8de343a53b712fee10409086cd9efd40210d84d20e0b159be5.exe
    "C:\Users\Admin\AppData\Local\Temp\bcd25d6386335a8de343a53b712fee10409086cd9efd40210d84d20e0b159be5.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:208

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3442511616-637977696-3186306149-1000\desktop.ini.tmp

    Filesize

    58KB

    MD5

    fcbffff7b0c8141d6dcb5101fac55113

    SHA1

    72a02a681e40a5ca04f94a4474b63e35619b7aaa

    SHA256

    7f2faa8421c115193c2d15918c5f58d8c62f7f1a5d022e6337aa5785574630be

    SHA512

    c9e90663ca49756973184193621be0f2e79cf5ce3c1f3adafd5ac1a4423f65a11c0c4c7c80e5e5896c149b933d8eec66e35cd6c050e704b9a7d9e94cb29013c5

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    157KB

    MD5

    05930b8ee98db0153543022f426442be

    SHA1

    e1afdcafae5df7c909bb644c76d6b99b78ad48b8

    SHA256

    f1339c937e41e578dbd8d194ac0c5fce3e0c75df3947d8684c7516809391852c

    SHA512

    0b13a8d95cca5aab2b930b72a53abc9537f135ded757e9f47d47c7322f934b636e1363f985b02ba6ccc8c3ab36aadbcee178b48f1dab1a31e183abd8e23a3260

  • memory/208-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/208-782-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB