Analysis

  • max time kernel
    120s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/07/2024, 01:58

General

  • Target

    48516815f382649015b5f93b5ed42f20N.exe

  • Size

    49KB

  • MD5

    48516815f382649015b5f93b5ed42f20

  • SHA1

    a20750de3e09d47faf6db7ba7c59431bb2a81f7c

  • SHA256

    994f2f1cf5a1a1af33e825f98bfc96116f5dc8006d5efeae1e59f5d69a4c3919

  • SHA512

    a5964d6deed30799a7cf9e415fea10e7cf1a58a4dc1a7b0b9dac3394b80910e62f9744edf0da55dbac2981f6aff4a05c50ade1a006a8bb4be7918f781b600d38

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFI7:CTWn1++PJHJXA/OsIZfzc3/Q8IZkG7

Score
9/10

Malware Config

Signatures

  • Renames multiple (4332) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\48516815f382649015b5f93b5ed42f20N.exe
    "C:\Users\Admin\AppData\Local\Temp\48516815f382649015b5f93b5ed42f20N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4344

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-701583114-2636601053-947405450-1000\desktop.ini.tmp

    Filesize

    49KB

    MD5

    dc178f757c78391b798001a2029e958c

    SHA1

    ba9288a65a73b0904e32fffbbf7badee3581d8ba

    SHA256

    5284a0806f353ea0d450ef4079e1aa057381c7325399908b49758ba218b6a6d2

    SHA512

    1dc8050b6bbdd486c5a6575214da10f7e52d3fd5bf70fe2b285fa891b9226a75d0113ce89caa331f89a4828d03628202488016544aa762b4e9473138b7513225

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    148KB

    MD5

    452c5240b559af88f49be3aa38479226

    SHA1

    7393a5ccb81bdfc3788a4e66d6d8cfcfb0b25432

    SHA256

    20f570903e75b479fc238de7e87856016350d477845ccbf14b668a77f54fb222

    SHA512

    9a8b6f64d1020e07757aca3be86dea053918dbc0e0875121b0a3dd94e6433682fa121b7e65fec29d842c7a44af285bab6a7b5b2d6ef36c03d5d7a0a20bc0c2a1

  • memory/4344-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4344-942-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB