Analysis

  • max time kernel
    120s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-09-2024 10:45

General

  • Target

    469412928f7f57a3b95ef6fe1bad9740N.exe

  • Size

    60KB

  • MD5

    469412928f7f57a3b95ef6fe1bad9740

  • SHA1

    7684525047480dc3d2689adb1fac296644c201f6

  • SHA256

    119350b61559800c131b51d46f37b961dade7a8bae71ec7513ce31b77d0cd3f7

  • SHA512

    7ec035df69eb426ef1c02163b709f7f478e8af33474f8a36b3649bfbfc3a4162d3eed6e5634186d71fcb9fca2cacd9867c4139714358344e7f2d5ccbde372f26

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8zxY5dNPAm1:KQSox5fAm1

Malware Config

Signatures

  • Renames multiple (4642) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\469412928f7f57a3b95ef6fe1bad9740N.exe
    "C:\Users\Admin\AppData\Local\Temp\469412928f7f57a3b95ef6fe1bad9740N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1244

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1194130065-3471212556-1656947724-1000\desktop.ini.tmp

    Filesize

    60KB

    MD5

    c0053c2cb247249d8a2849e35092dfd6

    SHA1

    b9ce40bb20a5dcd5f2f1725a997f380b6eea3128

    SHA256

    1be67f9bf260b31ceb7750099cd1a67bf5e01630d85ba027e4c9e84e06380350

    SHA512

    7fe34e4fa9b0d14fe66e20266ecd0a76f83d03196dda0700b820d5336da31c3eb4427c5d13941bd80e5bb2d54430bcbf57d8852b970c55e5fadc24774d5d3913

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    159KB

    MD5

    d8f61e4688f80bd18e711f3b7d932318

    SHA1

    146f852d12200c800c33655c453188e8a70baffc

    SHA256

    26e11e575067cecec81276c0f2de30dc8253a29ea459c67f8da7074a856df47b

    SHA512

    769e080da71f840aa6acfaef016546f1732b3591197e3690aa61946bf2e6b2eb6bf4c538ab33f8d182a628af4ef8a63e006f07ce267d3a214ccb4eb4ef1fd7be

  • memory/1244-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1244-859-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB