Analysis

  • max time kernel
    120s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-09-2024 02:53

General

  • Target

    545c9db62c28f6ffdab8001f86c99be0N.exe

  • Size

    57KB

  • MD5

    545c9db62c28f6ffdab8001f86c99be0

  • SHA1

    5f27d948750ebc31dd566ebb17228544133a74e7

  • SHA256

    79f7782f60dcd10415599c97dcc5e15a429aa44d2c727471c61d61f72624adf6

  • SHA512

    f59b8a07a75872c4bdd58326dc3bdf173f981a1ecb3c32cf5fbd3460651d3fca363cfbef997cfbc032722584304a6386f547b5899ee896289bb8196d0002deae

  • SSDEEP

    1536:V7Zf/FAxTWoJJ7T3ja0tbmmjFFjFPjkja0tbmmjFFjFPjunhuznhuB:fny1BngzngB

Malware Config

Signatures

  • Renames multiple (4644) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\545c9db62c28f6ffdab8001f86c99be0N.exe
    "C:\Users\Admin\AppData\Local\Temp\545c9db62c28f6ffdab8001f86c99be0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2412658365-3084825385-3340777666-1000\desktop.ini.tmp

    Filesize

    57KB

    MD5

    ddf676b9fa8e0ef90650a7fb5a47d156

    SHA1

    d2f2e8212ff961a02cf0b95badf3a30e795a3479

    SHA256

    8915d0a834fae9af999e3e2c2b8a0a642087000f9c380ede4826ca6c8484b0d2

    SHA512

    fd5174a22634d7cdead20045bc7f913d1d7a9f560a7bda7c7520ee96073549a93344e85f67b7df0b5278cac77e38983e80fffdc77b243b73bf808bc7c6922f93

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    156KB

    MD5

    e19e399cca4a9dec25e103c52fbfe975

    SHA1

    30f1b0561f50482b66f6868691c4ce359984aa16

    SHA256

    5e4e5879e7f07e16054535a28941377b34a4b79cd7ddf29e45754b17b1fddfda

    SHA512

    6a1b7ddfea85e05db2999858e2cc9e91f90b2001a5aac3b52847293b38fdd25607ff2bf60db79fdff2422cc92f3b4ff34aead7ec1f3f738b172f1c37791e7e72

  • memory/3312-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3312-854-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB