Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/09/2024, 00:28

General

  • Target

    a5e294381be15080017bf3fa16def69db125022761975e9aa53f31fd2a2c9687.exe

  • Size

    53KB

  • MD5

    628e8b85d5674912273c3e6f6748c221

  • SHA1

    31d5e4e2cb56aac9f08c89b34bcc31ec8dec62e6

  • SHA256

    a5e294381be15080017bf3fa16def69db125022761975e9aa53f31fd2a2c9687

  • SHA512

    30fc605579eaa6de9c4cb9c15645d6304fae82d5c0b88492e0c8ce1c8b1144de08bfc06c1b0a4adeac78074a6a6d629510fd520fee0d801ef57420b6dd1d3f85

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9wStuStY:V7Zf/FAxTWoJJ7T2StuStY

Malware Config

Signatures

  • Renames multiple (5191) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5e294381be15080017bf3fa16def69db125022761975e9aa53f31fd2a2c9687.exe
    "C:\Users\Admin\AppData\Local\Temp\a5e294381be15080017bf3fa16def69db125022761975e9aa53f31fd2a2c9687.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4296

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-656926755-4116854191-210765258-1000\desktop.ini.tmp

    Filesize

    53KB

    MD5

    1cf034f9c1e4bdfa547cdeba82f5fcc3

    SHA1

    a5c69f65a26d4cdb4b8bcf70ac08493e233b329c

    SHA256

    7edf4f2d2455804580f871cc9b97b832bb376de2af7a440b6061c9638e1c13be

    SHA512

    a2d778c80b42b35baa0ba5bb189fff086ef919800c8916cb052bac1862659125e639188e4c3bb178e3761ef223ff85394606bc02deab821da458154ae771f36a

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    152KB

    MD5

    4e0e56d4c14eeb609af92993a0a8e12d

    SHA1

    d312961f73fddf8fec0fb472e7111dda3e7c9658

    SHA256

    74716d9a4ad10a1a48be7352b871debb41a9153fb75f0115f6400dfa4952c1a1

    SHA512

    12367f4f2593881bc0156d27ff15cc73a2373f4d94c5ad7833abc6940e07a4af3a5ccfef792f882791e06a2ea68e60ead200da96e0c86200422c926cafcdfe4e

  • memory/4296-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4296-902-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB