Analysis

  • max time kernel
    120s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-09-2024 09:11

General

  • Target

    d508c4d98099aeacef301eccd4f51d65f5cbbef63ad9ed4773ec3e0825168eb3N.exe

  • Size

    57KB

  • MD5

    d009b76851106ef884e8edbda8dc2780

  • SHA1

    c09384b00d200846d72d40cd2885be8a68b9f073

  • SHA256

    d508c4d98099aeacef301eccd4f51d65f5cbbef63ad9ed4773ec3e0825168eb3

  • SHA512

    593ee90e0791eb68d48cf25e44cbd5302ce20ae8356002653b49e208ed1bbe8d0f0623a6d77a36b0d55d877d91264561c90803f1e68f2980d1554f32a86b7803

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9MEX:V7Zf/FAxTWoJJ7TyEX

Malware Config

Signatures

  • Renames multiple (4654) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d508c4d98099aeacef301eccd4f51d65f5cbbef63ad9ed4773ec3e0825168eb3N.exe
    "C:\Users\Admin\AppData\Local\Temp\d508c4d98099aeacef301eccd4f51d65f5cbbef63ad9ed4773ec3e0825168eb3N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2629364133-3182087385-364449604-1000\desktop.ini.tmp

    Filesize

    57KB

    MD5

    7c4089f3449dd530a0fc6ce48d55c0ea

    SHA1

    a73276ee11469556058c94177f4573166d18e9f9

    SHA256

    24366542b535f3b13d7c53a798fb7d7566aa1bd74025de35c2a886672429362b

    SHA512

    7c67f25982b556714bd0ee357d9011a300af9c181b66dac73e75491f9950a6d396b49101298b63b40301806b4b07c128b1c2040c4273bbc69629e56867ca604d

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    156KB

    MD5

    c892bd38a117df4190fefdfa82f0002c

    SHA1

    9398827ce886aaf8ce6108e0007ded1771016e93

    SHA256

    f21889fb34ded49a636ba554147b0f31c45a50231d0a83678d2de408424cfebb

    SHA512

    614b625b48b03a91d9c4575891fde47b3339cdb85591d12f041648ef4ec25d1132ec56f5f880912c17abfbb5eae18e8e2c829dd19aec3744852199c3a8c7b344

  • memory/1524-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1524-786-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB