Analysis

  • max time kernel
    120s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/09/2024, 00:19

General

  • Target

    0a03afd8af013cb153a26d50dd927f50N.exe

  • Size

    56KB

  • MD5

    0a03afd8af013cb153a26d50dd927f50

  • SHA1

    c4b47102d2911aafe69da6e58e8d1734c8d064d5

  • SHA256

    a7fe8732b21e18d0d765e045ed6355d4e289c5989ec84450d0b4b714fb06e2cc

  • SHA512

    ab532400e5f6fb018c91f76d35e2f7b3a5b458f30308ffab5438e0eb90cbc694950cb56034909920f058d5e32612e91b32cf6f3f50d91154f869a11ef7541bd6

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATBApwp133EskmKV:V7Zf/FAxTWoJJZENTBAOIfmKJfmKQG

Malware Config

Signatures

  • Renames multiple (4627) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a03afd8af013cb153a26d50dd927f50N.exe
    "C:\Users\Admin\AppData\Local\Temp\0a03afd8af013cb153a26d50dd927f50N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2032

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1302416131-1437503476-2806442725-1000\desktop.ini.tmp

          Filesize

          56KB

          MD5

          1131f2394bc0e44538d2821b0db7201a

          SHA1

          8bedeb65e62b2c2352a65f88a3374199040db07c

          SHA256

          839e0b17d6eab2c549c46e79781c2460df60c5dd3e6ee194308ee948e2af7f2a

          SHA512

          b7aec696006b8f54a24610da67eee1e10dd646bafb1813d05f6a771b7a51fa9ed55edc9f3c080d3de108bcc7dde75400f369073ccc4ab503f1cb031bd7d864d6

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          155KB

          MD5

          23a8f700c46f79baedb36f6639605b9d

          SHA1

          a5cfaddb58857f5311dfa07bc4a0355872913bbe

          SHA256

          b8b4ccdad2bb14b3fb7ef50c566c360c11c499847a5f75b69b0e7b73d83cd781

          SHA512

          1ec381f1859a7babe7c0dfc5eff6362be42fd48e4ebb4a21fd788d6fb3da781a37822f6b0799343fea04b864ab41a94fb04511a5485fc5c7510497941aa5ac14

        • memory/2032-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2032-906-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB