Analysis

  • max time kernel
    120s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-09-2024 04:00

General

  • Target

    ca226b42d38a747e21571cc09025cbc0N.exe

  • Size

    76KB

  • MD5

    ca226b42d38a747e21571cc09025cbc0

  • SHA1

    313988561ead0b2a179d8c2c25a15d46d044908f

  • SHA256

    c4bd8a6a5ba2fa5b8247e67ffb1902664225642eac0a21cebc145965e64fc856

  • SHA512

    dadac8d9326f84a42fefc66ff6fa95f8e6c5e3a5e75ed2697b0d77d37186b988de17210ee51b93e021a9a95664748998e2568ec5a756e0c18000ba735a0587fc

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9woOzOuiJfoOzOuiJ1BT8:V7Zf/FAxTWoJJ7T4MgTW7JJ7T4Mt

Malware Config

Signatures

  • Renames multiple (4630) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ca226b42d38a747e21571cc09025cbc0N.exe
    "C:\Users\Admin\AppData\Local\Temp\ca226b42d38a747e21571cc09025cbc0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4436

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1302416131-1437503476-2806442725-1000\desktop.ini.tmp

    Filesize

    76KB

    MD5

    2fc0954e78337fdbc7639e3c274cd97b

    SHA1

    632ad2ea50bbeb31459f13a4b8d51a30bbeddedf

    SHA256

    6b6279ea72dc89958725f4b48282634f68b1531dfa68880d8e07558f6aad9b73

    SHA512

    9a0d090238b7db063db0a163fd145665e83d7986d5e1286c9f7a75eb9f9e4672f8e56eb4c07627dce168824b76847678aa4c96ff3e2865418495bc9ae0aa7639

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    175KB

    MD5

    4c37c46683e4437f626fbaca64621830

    SHA1

    a90ea3194b6bb51362241a17fc5e472430a1eeef

    SHA256

    fdf3b7235c09aa497a899c7e65bbeab442c3ae74cabe74d6e99151a41b830293

    SHA512

    9a7208d27c26b6252ed530e937e3a6649295945cee552de3342372c36cff07c760bdf02d49629f1461d17368d9132f546e237b9723812e0a96aa96247f8969b1

  • memory/4436-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4436-874-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB