Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/07/2024, 23:04

General

  • Target

    132110b1fb0f321ff7bf7af41e40d160N.exe

  • Size

    924KB

  • MD5

    132110b1fb0f321ff7bf7af41e40d160

  • SHA1

    96d9b3468eac437cd0d3b077152ee4800556b688

  • SHA256

    baaa7bd6789404e4916e2759b94ab1a345beadf6ac5a36b0d585b9f5edf5aed0

  • SHA512

    6ddaba233228a0802cf50dff99653f696c60ef323c2006b0184daf91a893734cc11d3a15aed23103831eeae7f5f148d89278abdc565a8e1c04f3173939eef6ac

  • SSDEEP

    24576:p5MTl31GZzzye1kWkhCkhVvlQuLM4paA24QQ0gaiirmMzQlVWTnk7ZqDy:rdzV/Vg7

Malware Config

Signatures

  • Renames multiple (1150) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\132110b1fb0f321ff7bf7af41e40d160N.exe
    "C:\Users\Admin\AppData\Local\Temp\132110b1fb0f321ff7bf7af41e40d160N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2268

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-701583114-2636601053-947405450-1000\desktop.ini.tmp

          Filesize

          924KB

          MD5

          6e45fef8eb39d1be70556c5713b740ae

          SHA1

          95c454be86142aed6aa879d8dc16c784df1f62e9

          SHA256

          c5f22eb9e6d6eac832263509b441f19f37fa3491c25e3b23f9abc692336cecd8

          SHA512

          1f191bdd4d3a1550272eca97bd4ffdaba307ec974d99d984e5827cf23380716a3cd9a5bb40d9b4aa29b329a8fd689083c17eca0481b2ebd6cf1826ba5602c3c5

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          1023KB

          MD5

          77bf47ee76926c5c74286db780680eee

          SHA1

          b51ae5f0a274fdee1d552d00dc25785f7d594450

          SHA256

          7e3aa3efe02ab7bee58adda9436736164af11d6662ec3df9f9eeeef7bf00e1cd

          SHA512

          6328dca40fd4f6a91ecf162a512ddb412750886542ff933abf6d9e386d5fd158676c52dd149868b5f894fdb0f9a74598a05041a6951605cda96c997d4590a26e

        • memory/2268-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2268-696-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB