Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/08/2024, 14:29

General

  • Target

    094485e4e205466085b1f7dbc1fc4ce0N.exe

  • Size

    51KB

  • MD5

    094485e4e205466085b1f7dbc1fc4ce0

  • SHA1

    20aa4dcc54bab4d72c0366613adaface0bc3af01

  • SHA256

    69c5e94820ddfc1ce1777159af2d54aea060f21053682817912c9104e9ae1117

  • SHA512

    4184dd59a6233c4d44fbd8258e8a6944cf3b59d58433db26fd2fa0872bf009e31dd1bcb8c962b1b10687c58ec6cacfb83e058528277abefbe80f49a559aaaeb5

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMc1yw2Yw2ShfhC:V7Zf/FAxTWoJJ7TZxk

Malware Config

Signatures

  • Renames multiple (5123) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\094485e4e205466085b1f7dbc1fc4ce0N.exe
    "C:\Users\Admin\AppData\Local\Temp\094485e4e205466085b1f7dbc1fc4ce0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1072

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2412658365-3084825385-3340777666-1000\desktop.ini.tmp

          Filesize

          51KB

          MD5

          ae9c60e60187b9cd57c65b664d73765d

          SHA1

          b26ea7b72b8c8b66f801fec6d3e58ed2b877beff

          SHA256

          cc67f698237c28a80ecf43fdc973bcd194f7778e597b9fd21742eb9cd24ef15a

          SHA512

          608ce75bca8b362961366a710a6349c08dcb4739026663fe67be5c0fbfd271fb9a76af347e018912960eb99e99f790a424814fdefaeea9cd7c5f1fbad506aa6c

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          150KB

          MD5

          7090d3aab87e687e218a8c4195345b36

          SHA1

          56573bf3e3bc773d42ed2c221753be77461286f7

          SHA256

          1d7fc3861108b1361eeaead449a7a19d9b936ff1e9edc3c66190891385f13b7e

          SHA512

          360c88e4edcfe96876063b6cfdc5bf6aebd60d7d19171c50c5a9b1313aefd42458987029a89c51c79a17b3faa9acf752236632d8cbf4fa157f1fdd96b651ce76

        • memory/1072-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1072-902-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB