Analysis

  • max time kernel
    120s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/08/2024, 19:31

General

  • Target

    dd1493e98edc4522e8f38534f807ffa0N.exe

  • Size

    149KB

  • MD5

    dd1493e98edc4522e8f38534f807ffa0

  • SHA1

    067c6767fe175a2a39d5ed108a877731c565d18d

  • SHA256

    924c25fe0ec3caefc0be31dbd3b86daafab4eae920d1eeb775eb63ad02a71d5d

  • SHA512

    3e9228dce01a2b5c5ee51d74c5e15d5d58f3aa65cca0b4cd0aad849406cd1a6996f8a607106e9ec2ca9275ff0c07b4edc4ac1a89e9539ecb2e2f3cc05a3e3ed3

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8NCuXYRY5I2ISTWn1++PJHJXA/OsIZfzF:fnyiQSoDuXuv36QSoDuXuv3cimi/

Malware Config

Signatures

  • Renames multiple (4230) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\dd1493e98edc4522e8f38534f807ffa0N.exe
    "C:\Users\Admin\AppData\Local\Temp\dd1493e98edc4522e8f38534f807ffa0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2252

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-786284298-625481688-3210388970-1000\desktop.ini.tmp

          Filesize

          149KB

          MD5

          da94e7f5da0cf1b0d08d7cb33db2dd75

          SHA1

          4779fca8db53110aaa19462a2f8fcb09c9447df9

          SHA256

          0b159c81484036636ed7736806ed248e021fea3c853b1fab663b32cf57c2bc92

          SHA512

          5b43e38c4524367fdeeff227fb177158fcb246560305ed66a6a445ec8b4b9aa79441f13c135a4932e8e82ccf9ade483ac87e283c5a13d16eb859e2f1b1577e99

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          248KB

          MD5

          be68b45ac03274bd0efdb9be1dc89870

          SHA1

          24fa457123354a4c54e84b3bd3fc04464a879e50

          SHA256

          7800df2a06a873210f87297633eee9ee308ceac4fb32c88c5b2f52ece6e64b51

          SHA512

          d86015b6be148955bb5bd169a8cac787846bdea975ec8d628cd47bea296efca348c888e5c91ed85a93f0d6b6bd26622c82610a2764e6938fb806efee525c21b5

        • memory/2252-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2252-1780-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB