Analysis

  • max time kernel
    120s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/09/2024, 09:00

General

  • Target

    c25d270fc40ae6570db20a06b7b51150N.exe

  • Size

    27KB

  • MD5

    c25d270fc40ae6570db20a06b7b51150

  • SHA1

    a2a13b260bb27b8c42d13867674c97c6f29fa9cc

  • SHA256

    9086c68ec7307bbedda7e3ec182d9474ebecdffae350eafc2e9e52cdf87934da

  • SHA512

    aa4cd51258608e9634481e67b9f2701ee712dee1b934bc2497a4dc60521dea7e12f5e71aee9a02f03575bd0883dac3f230d8b95b81d9929ee5df1d59adb1c39b

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJ1Evd5BvhzaM9mSIEvd5BvhzaM9mSsxmMxm9+9ZJG:kBT37CPKKdJJ1EXBwzEXBwdcMcI9ZJG

Malware Config

Signatures

  • Renames multiple (4686) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c25d270fc40ae6570db20a06b7b51150N.exe
    "C:\Users\Admin\AppData\Local\Temp\c25d270fc40ae6570db20a06b7b51150N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4416

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2392887640-1187051047-2909758433-1000\desktop.ini.tmp

    Filesize

    27KB

    MD5

    2272dc4deb9e8a00dc661c79d9ee41e3

    SHA1

    aec8e5a8a47259e80d2b0cc69312463fbec69d84

    SHA256

    809255ffb5a7d1ddbecd9e97149d746171484f0a873d013c2f3d7ed04667bc11

    SHA512

    9dfad63f49e2524bb568cb8f9c41e2d7e1ee6a656712023868233b108679ac1dc5e2cf79cd82123794d1d6377cf245969e9c8a9ee4158968acd555ed730cc30f

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    126KB

    MD5

    180c46f27b165d38741c34a2a04d5cef

    SHA1

    fdcaf01ddac14d1fd697e0f357692f2336587f82

    SHA256

    e7111c73d39b9c394ab537c7597356bc2afe088bb565dda3d3d3cb36c4690f91

    SHA512

    e1e2864ff24ccf54a2c573d67aa4f764ea426899ce84b7989db8fe7b8aa2f450f6ff1425839d68754f7857bd90c021a29572d464a7b91ad36b1f3f1d351b5ea5

  • memory/4416-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4416-1022-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB