Analysis

  • max time kernel
    120s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/07/2024, 11:04

General

  • Target

    c4264923719e2711676bda87e55dac20N.exe

  • Size

    47KB

  • MD5

    c4264923719e2711676bda87e55dac20

  • SHA1

    adcb9a22a66727a469dcd2e56442be2691c32a79

  • SHA256

    1af4a7c8662406b22c5d04e14c7634c373bdb1c1a563316f3e5a999c134a3b6c

  • SHA512

    1ed9d17c8d202e2402c8c95f1991ab77962dd1ca1fae85f6516c11eeff91a900d0bd9a8c842f64e85c7bf0764851e6c583a969e8668a7ada93d58317b4602dad

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJBZBZaOAOIB3jM2jMHrRr5:V7Zf/FAxTWoJJB7LD2I2IHtt

Malware Config

Signatures

  • Renames multiple (4641) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c4264923719e2711676bda87e55dac20N.exe
    "C:\Users\Admin\AppData\Local\Temp\c4264923719e2711676bda87e55dac20N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:5104

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-47134698-4092160662-1261813102-1000\desktop.ini.tmp

    Filesize

    47KB

    MD5

    4cfb86ee4ebcd9e6fb699ee333a7b265

    SHA1

    24d02165be2a35ac13acd12dfab0b015a4ad42c9

    SHA256

    9bdf72a22381c46c755179859295fa6b543b0b64a24cb5652d27988e25b2f681

    SHA512

    25faa811a2902b48e6eee5eecc74680e6ea63e062a66a84469f39276900a83c843e3093b56ca80a4a5d79088e540ba62e25bbe0ae283b9e6c27773eb4a337f92

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    146KB

    MD5

    02d4affdc3a760b6c561c66a2d5154c0

    SHA1

    6bbaa860e364f99f56b03ceaad4fcd5bf1c9238a

    SHA256

    de4ca351e7cbcc784823f0fe0df33edcb8935af21293ebbf1172465866dfcbb6

    SHA512

    8561dcc2363921fd26e80aae01d92110a88eefc6bc3367a40ac36bdd7e7e549377b46d650c7a8eb721eebd48b1eb9a60cf096b50b37aaedcf01ef8dfc667b0ad

  • memory/5104-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/5104-1826-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB