Analysis

  • max time kernel
    120s
  • max time network
    116s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/07/2024, 13:33

General

  • Target

    d48539c04544c70e0b70214a869d18d0N.exe

  • Size

    130KB

  • MD5

    d48539c04544c70e0b70214a869d18d0

  • SHA1

    bd1e7c77d03fc7043c1ca65f5b7044ea61f4a9c3

  • SHA256

    24020920ce2ac2ff349d60347fa3efb5d1d243be1af680da7cf47923c5f2ad5a

  • SHA512

    80ea12b7c5449b1ebcf0f3b587721f4d8108227d7b47bf529906938c782b6774fa7cb681d8c3a01460396d0ddf5848b2307c2b1b61c4ed17ce250b946f5f5a9e

  • SSDEEP

    1536:a7ZyqaFAxTWH1++PJHJXA/OsIZfzc3/Q8IZuEd4HZKMSs9w7WsLhEC7ptUHJQWJ9:enaypQSo7Z54HZKMx4dhECVO

Malware Config

Signatures

  • Renames multiple (4234) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d48539c04544c70e0b70214a869d18d0N.exe
    "C:\Users\Admin\AppData\Local\Temp\d48539c04544c70e0b70214a869d18d0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3564

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2990742725-2267136959-192470804-1000\desktop.ini.tmp

          Filesize

          130KB

          MD5

          3abfa983cf7382649e1616198e43bfea

          SHA1

          ccb33b8f7d972cc6318c317ff49823be0e0819bf

          SHA256

          2c4ea31595b8ad68d75110befcd4080babed57a7e30fc3344cea896859702ff2

          SHA512

          b914fd328cb300a89b22c3f1abc3f0af8df65229ef067b2de8813653fbc899807bdaa4c70dd9e8c5af4d792de1527220b67ee0029422c7ba8b00c571ac40401a

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          229KB

          MD5

          bbd2c2518debc09559a0dcacd094ee20

          SHA1

          ec6ed4a5362a51305c874dcb44cdb056edf463db

          SHA256

          5e9028312724cef2940607eb42631e3b418eb68ff0d4210b50c49b36774cdea7

          SHA512

          82725f4201953e76d14076c23ca886497357e3b2ce9b1e12698b21243b0adda6e5a0606c6ee4938895b96d52e803569f55af416d24078e21419325149922524f

        • memory/3564-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/3564-1742-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB