Analysis

  • max time kernel
    120s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-09-2024 12:56

General

  • Target

    ab09fa6ffde15530935106f67d2b4090N.exe

  • Size

    25KB

  • MD5

    ab09fa6ffde15530935106f67d2b4090

  • SHA1

    2bb3356c7e15251f838455d4815ac74697363bda

  • SHA256

    b524e3ed3bab2f1183b2a1e4c132992b7b42dd3fbb120a6ef2920c7ab899c99a

  • SHA512

    e9f07b01990b596deb445cb0e3a31694c62a45f77db6b6c88f64bf4ff439f92a47d3bb093bd7c10517b6e09fafb5e239c32734cf8d23980d8c467641d9538cc9

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJ1Evd5BvhzaM9mSIEvd5BvhzaM9mSsxmMxm9+9O:kBT37CPKKdJJ1EXBwzEXBwdcMcI9O

Malware Config

Signatures

  • Renames multiple (4678) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab09fa6ffde15530935106f67d2b4090N.exe
    "C:\Users\Admin\AppData\Local\Temp\ab09fa6ffde15530935106f67d2b4090N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4420

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2718105630-359604950-2820636825-1000\desktop.ini.tmp

    Filesize

    25KB

    MD5

    d6ad40015b70d6a322dc8d2fc8aeded9

    SHA1

    ef248952471cae999d611263412ce7f438a561af

    SHA256

    6113f8f66055736b979376b6436151ce8e85e83421554689233663a567571f25

    SHA512

    e77364853906c3baa5ea691b978ace024fd98d26927b235df433e08bf220ad9a800c1b483a139d5f47e7519445c6e6692d1c6a948096eac1c9910b98d8e1526e

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    124KB

    MD5

    e333046ba4562d9ec6a207bee44d0378

    SHA1

    970a03c16b8c1059ffc6011b179b9bedf0a31725

    SHA256

    4e537bdcbe2af189a1568e53122502623103beea510d77f007ed085c14e3bc2a

    SHA512

    0ef0e05ae52fdfa841d7b45523f5e23a4f72f472ebedc9a326ee06946dd83f8eb0e297b216c11cf64804b45c097be787212bb7af3222c873d4ec7c64a31ee93f

  • memory/4420-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4420-995-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB