Analysis

  • max time kernel
    120s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/09/2024, 09:12

General

  • Target

    9862e6f2cb25fee720d9d67c22e2d880636a5d51b163a3df57100785479d8e53N.exe

  • Size

    95KB

  • MD5

    52cf336fcad035691b5c836cf9919770

  • SHA1

    554206730df8cdc12197d0129c3431f904db4cf7

  • SHA256

    9862e6f2cb25fee720d9d67c22e2d880636a5d51b163a3df57100785479d8e53

  • SHA512

    668688d13c7e48a7dec4f2100f34f94bd5e1db9e2d51085f96f3d4f4f01f3091210d859f8b878f737649f125ebe93dfd9a1850aad5a8f3a4d9b447407749e318

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTBTYhQ9TW7JJZENTBTYhQ+:fny1tEuQmtEuQ+

Malware Config

Signatures

  • Renames multiple (4622) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9862e6f2cb25fee720d9d67c22e2d880636a5d51b163a3df57100785479d8e53N.exe
    "C:\Users\Admin\AppData\Local\Temp\9862e6f2cb25fee720d9d67c22e2d880636a5d51b163a3df57100785479d8e53N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-945322488-2060912225-3527527000-1000\desktop.ini.tmp

    Filesize

    95KB

    MD5

    58b318e1810418bfd85680f1a01bcfe2

    SHA1

    4f23fce1be51d00d72d80c7d4196d1ccbe29767d

    SHA256

    299103065298b5fedddf8abd6a79d9af1456b46b7090c2d04c1e495c99f0f93f

    SHA512

    4e624bfcf4f7dcc1ddd0a3a3165d64932e5a0712423b454983816de7329e1a094e82a9dc080471ad7d6c755dfba8b6ba4e8cbadbd6b96617b9ecced09003b35f

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    194KB

    MD5

    21d553fce1a0f747311600309f7fc62e

    SHA1

    b79bd61dbb28ad874e83ca8bc6d52db6165eca4c

    SHA256

    3ba1a01401821ea27630856ecafd3efb33ba03090d773a3c1f4c31ec2182f73b

    SHA512

    d0c8ee6166f721cc789a0c946cbc0826a057f528f453f9bb9c49bb7bfab0e539601e3a11e1befb19df930b50685ef18610e9fccc039380732be9b98dc7ae5f5e

  • memory/2472-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2472-896-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB