Analysis

  • max time kernel
    120s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-09-2024 11:53

General

  • Target

    434cdf99477df6e9efc4a9afe67ac8c0N.exe

  • Size

    38KB

  • MD5

    434cdf99477df6e9efc4a9afe67ac8c0

  • SHA1

    0ef7c91c3acb540a7d2a3339a0e550ac147679ab

  • SHA256

    0b676ac46a06d6338569a4b4d14d2b4c8ee749f6a9404d005a1039e67c493dba

  • SHA512

    f0fcb648878e9281542a7d247d748c15fd0b8f0881ab4c0ae622e7a1af39524896bf5220c7f78729f556eea240bf17e7305254b45ea3ce21df36895ceb1254e7

  • SSDEEP

    768:kBT37CPKKdJJTU3U2lRtJfOLP7PNcAPJacAPJP:CTW7JJTU3UytJfOL7m

Malware Config

Signatures

  • Renames multiple (4684) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\434cdf99477df6e9efc4a9afe67ac8c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\434cdf99477df6e9efc4a9afe67ac8c0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-945322488-2060912225-3527527000-1000\desktop.ini.tmp

    Filesize

    39KB

    MD5

    7aecfda1cec24f999cbdee13d079fe24

    SHA1

    ea08f968e4405ca94e3b1772022a90474740725d

    SHA256

    41485cd3964db77aef7988b628bd01b731c814603a05169679e9eea39275ad34

    SHA512

    7caaf706f7469a6037e5ea296d44d5b9028b7f6d777265d723e81d2a7430da5b4b29f89ec5008ece82eff8d1a8d81adde2bcb93fe2a18e4fa8f05d4db33c2f9f

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    137KB

    MD5

    53313a2a15a719fe35753baf1856358a

    SHA1

    ba70d0bf496fb9010aaf49dd1113c7d5e5df65b0

    SHA256

    b45c12020053a3d12fd22a7d5e9eea8150a02364c64db2f5c9966c43b8be4c35

    SHA512

    bac35d630c02a0a94aca052ca33f0b70eae7eccefd694dbbed5a9554020d7d05aef023c1e87fbc7caec3e62a6060dc2b64bbc31732248c17e60f6141adf06648

  • memory/4488-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4488-918-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB