Analysis

  • max time kernel
    119s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-08-2024 00:10

General

  • Target

    d95004ef8e1814a196e836e993f24a20N.exe

  • Size

    136KB

  • MD5

    d95004ef8e1814a196e836e993f24a20

  • SHA1

    2a1fc0213866c69021eb528fc80ee923c0b2da58

  • SHA256

    cf6ad1811b15ede582b664afd95d2f1360b5d83d61736433ce7ab9266f2531ec

  • SHA512

    4d60d28287d8c5677bc59651ce3391e1dd20b2ce04d933f29ade84e7491f5885876fa09ccd3d84d3650e786313168c8e1c72f5e70ef62befa88eaca264e2d52b

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxY5CTWn1++PJHJXA/OsIZfzc3/Q8zxz:fnyiQSox5KQSox5a

Malware Config

Signatures

  • Renames multiple (4316) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d95004ef8e1814a196e836e993f24a20N.exe
    "C:\Users\Admin\AppData\Local\Temp\d95004ef8e1814a196e836e993f24a20N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-945322488-2060912225-3527527000-1000\desktop.ini.tmp

    Filesize

    136KB

    MD5

    88b0d4c2cc6e948c2457d43cba3a6d48

    SHA1

    21c04c0198d95997ea89ea6c43599519848756b4

    SHA256

    166c97e2a5fb81f9bc269741876afef08925df4363263b4c99f2064c33127095

    SHA512

    53b48406ae12e8e38780df9633c53cf2efa1cddd1448b7a02b79039acc91ce2738e7969e656fd2c64ed17d6cd6c69ee3b8a585c50cb2e94a5d4bc83e6569be24

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    235KB

    MD5

    2a942716fa19e1cd38e80a97a4e44755

    SHA1

    c150b1043fcc94f910c20e16a8b827fa32bc6e98

    SHA256

    7f08292d7b8da52079f0f92657636695ed53de5a145270900c5d919450f08036

    SHA512

    82e46d0ace3fa147a502f0b826537cd443d6395d0afb81e2310f8bf2610e67a8ed8c8b29f08fe65381b1aaf16405f573f4bd2d91326e766d16ae284851eef962

  • memory/4472-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4472-806-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB