Analysis

  • max time kernel
    120s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240730-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/08/2024, 22:42

General

  • Target

    14aed829459d09cb43656c52398007e0N.exe

  • Size

    47KB

  • MD5

    14aed829459d09cb43656c52398007e0

  • SHA1

    e4b7be314bf92c6ef55c9753bf3ab42f49bd6632

  • SHA256

    4814714af2d73bd5f7778b9db5a71705984e904d8d8c53914d84204034cd9e5c

  • SHA512

    2cb27259f561bb07354b46acff35b52602a8edd964d9672d21aa16bcc13271a20dd1292b73910c82276402929b828bc2255c7daa6191c1a4c156ac1c391b5240

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJXGiXZqV92N2X:V7Zf/FAxTWoJJXUVYoX

Malware Config

Signatures

  • Renames multiple (4670) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\14aed829459d09cb43656c52398007e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\14aed829459d09cb43656c52398007e0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2721909339-1374969515-2476821579-1000\desktop.ini.tmp

    Filesize

    48KB

    MD5

    3c01ccf2c8e9cc0ccca86b9ff96fd0c2

    SHA1

    3236a08ec56311be01ffaa3a73b00ae764571e4e

    SHA256

    05ef66ec07ca690c82db23c06261b4d62842cbb84273aabf7ce5320aa57b297c

    SHA512

    5a60114b5dcb4d7687d08cbbd4762fe8f693d1e4c041bc42338560e9a9b9f5d7a3a802fd52a54389821dac5e0c7f0686a029795b0f0e192e28bd7981ca2e5e5f

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    146KB

    MD5

    e732b4a662c03778cee4edcf336cb9b5

    SHA1

    3ffd824bbdba9f710f20e1514d50e9a31e25aefb

    SHA256

    739506eb7172d9818929a6b5fd8ad07bc10b4025cf979e16b9aa1f4e28a2741c

    SHA512

    c1758ffca3394ee0788181d6ea6981371129b0236ff7ad3a695d1bd0ebf6ff5eeba43af769fd4344809ba9a135d5b407ca0d6b59ab61648f3b4b24aa76a55ee8

  • memory/4884-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4884-1956-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB