Analysis

  • max time kernel
    120s
  • max time network
    92s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-09-2024 19:54

General

  • Target

    55541c3ccdb8e617f2499c4074be60c0N.exe

  • Size

    64KB

  • MD5

    55541c3ccdb8e617f2499c4074be60c0

  • SHA1

    d8ab1d16a34e732e13639508eabfdd102ee021f6

  • SHA256

    5441ccd4cab23ad61bc96e5a763803839a21251d20fe4d89694b706010efd8ee

  • SHA512

    c419cf034b85205d115ae2d7e54023f19b00f89b0c30560f900a026bc51e5c859dcd79562d94e5adc682893a64a3c02c69f8a595a435ba2303c2e9b1e951adea

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcwBcCBcw/tio/tiTBRiCwG7:V7Zf/FAxTWoJJ7TTQoQvTwDwl

Malware Config

Signatures

  • Renames multiple (4645) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\55541c3ccdb8e617f2499c4074be60c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\55541c3ccdb8e617f2499c4074be60c0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-656926755-4116854191-210765258-1000\desktop.ini.tmp

    Filesize

    65KB

    MD5

    d684ef55da92a56958cc428829d515de

    SHA1

    6ac96d3c913211ce81ab8d6e4153d64c4f88f4b1

    SHA256

    a00a78ccbbb288c7314e3628d54d2610ebf4261ffec236192809f8e7d45de15c

    SHA512

    56c0f7c1179f6787fcdf22fe4116e12496c619ed0b0b2b87059c1d2f6fc61f20dddee09c07f396391741d26ed940e8af09054568ea97dbb04acb7ff49f3168aa

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    164KB

    MD5

    d51d217c6e3016d34bf9861a361a4e0f

    SHA1

    358c43af9d899485266bdd86c11ec11d40abb809

    SHA256

    e0a8c4f5a00383135aa75c151f67b733577c9fd00558e2c4ad1f215293fba91c

    SHA512

    fab0445c4ca291513621bebcaa9b746f7f88c224cf6f08520d0f3b75c5497ce0c9c246440e35137492cdec348818c74079c8676e7d992f78a2f5f56f1763a5b2

  • memory/1360-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1360-860-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB