Analysis

  • max time kernel
    120s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-08-2024 11:17

General

  • Target

    48c742691e8c1944fc68bf44be630da0N.exe

  • Size

    36KB

  • MD5

    48c742691e8c1944fc68bf44be630da0

  • SHA1

    a2c8041ded913e03eb299e3ed73dd449ad7a7c09

  • SHA256

    0fef482a85d668d5223212f0dd3c2692bb40b54bdf8661ae970e3aface5ed0e4

  • SHA512

    7c4abf4eb7cc2b08bb5dd5f617e716fce7242519001cd64db112a62c4cc9f9b12af2d473bc450f3c25fa0df34a8dce9170990a0dc63aa3b46a212f59733b6a70

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcwBcCBcw/tio/tijcd1:CTW7JJ7TTQoQjcL

Malware Config

Signatures

  • Renames multiple (4702) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\48c742691e8c1944fc68bf44be630da0N.exe
    "C:\Users\Admin\AppData\Local\Temp\48c742691e8c1944fc68bf44be630da0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3484

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-523280732-2327480845-3730041215-1000\desktop.ini.tmp

    Filesize

    36KB

    MD5

    7872b0b0d8c322cd9eb91a78b00a5d0f

    SHA1

    0c2d916bb77bae5d876417b6958e9f6a178fcf8e

    SHA256

    9c76fd46d6e37d8b0c7a0e6a9e44ebdebabba32380f11ada03949689c68c691c

    SHA512

    e60cb85631af96225134bf805b16c771f219a49d4b32ebb3fd716b0744c902d588937feb6808599f32aad14c5851464a2b084003d01788c9666b8ebe9171f1b5

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    135KB

    MD5

    6b04935c60285f0bf5426b94c939f30e

    SHA1

    4ce7bf9d8278e42c693c401dd61861d1a15c0ac9

    SHA256

    218da4f578571c9de6a662981acaada37b33c5cbe02455eb744f238857bd0d32

    SHA512

    d59833cd044753da29e2e9488ee4ad4b226692607539030e4592f8adccf8e11912e88b87fc22a4111a44be383488e6e1ec541214f2dd78dd081d0633d34176cc

  • memory/3484-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3484-1006-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB