Analysis

  • max time kernel
    120s
  • max time network
    117s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/08/2024, 13:47

General

  • Target

    3a330b83b51862e816889c04021d29c0N.exe

  • Size

    169KB

  • MD5

    3a330b83b51862e816889c04021d29c0

  • SHA1

    543ee9efc74960dc9f980e10ca384c14d51ddb0c

  • SHA256

    864aea20d3667e2b145e3b0e3df3ef335c58afe50c7706855c3972ea175ccd37

  • SHA512

    db6ed4b4239c1818ef593d8c4cc3d09c9d9a08e649080291cbba2073441fffa8b31a39fd10ae346118b78afd28c924b4aedbf1e6f4ae5d773329f5a6cee0c0ce

  • SSDEEP

    1536:a7ZyqaFAxTWH1++PJHJXA/OsIZfzc3/Q8zx3Y3hx+fsio5UxKzWZ64+A8C4bwc:enaypQSo6VEio5Ua4Nw

Malware Config

Signatures

  • Renames multiple (4270) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a330b83b51862e816889c04021d29c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\3a330b83b51862e816889c04021d29c0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2860

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1194130065-3471212556-1656947724-1000\desktop.ini.tmp

          Filesize

          169KB

          MD5

          6ad7968620e5f21129770a5c613b8d9a

          SHA1

          2d51adef7f1f5961e4a752eb02c01301d0f5fa81

          SHA256

          2140dd197e0ab38341ab946c63d3fe768a88d75d01cb24802eb48c4ab3a30ef7

          SHA512

          9902770c36dadbe002e4acb7b6ba52d57dea617b7b473feae063e26718a645ed406cfb3db4c41b1637de6e57681fe3b11a6ec526fdf14228b6fc25fb0a07cdad

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          268KB

          MD5

          cca4145911a8279ae9346afbe78e29a6

          SHA1

          4175896c4a7bd4278b3563f0ae0f8f5f94fce0aa

          SHA256

          cd6f578ec819fe9b017ba19e636a004133a6ce84aebdb2ae82dc48b911bd691e

          SHA512

          9a5354b6c47ec2bf96a1172b154ebe7d3b59bd66e1ce72befe79dfe90d001bde71f6b4d3f29622871ff7cccb79d299aa2da7e5220103938f364d5b3a7d2e6b76

        • memory/2860-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2860-794-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB