Analysis

  • max time kernel
    120s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-09-2024 09:23

General

  • Target

    a4a6df937f338b12c982dfa939c3f2404623f3b137d73fec0da54e1793e36d89N.exe

  • Size

    43KB

  • MD5

    f09e3b5a2358dbd43303a27ad7e02300

  • SHA1

    6e1d31a7e755c22c36535110f19cd4e3ef12e5fa

  • SHA256

    a4a6df937f338b12c982dfa939c3f2404623f3b137d73fec0da54e1793e36d89

  • SHA512

    4f3ee11533b49fe33bdf0794c3a1aa596e42d3791d6b9303bc1470dba7db2cf22abaffb43a8701a4a396ffb3ae5ed7104f8d0dcab1a9eaf86d50f62cde290d58

  • SSDEEP

    768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATBApwp133EskmKsN33EskmKs0sFJFX:CTW7JJZENTBAOIfmKJfmKjsft

Malware Config

Signatures

  • Renames multiple (4648) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4a6df937f338b12c982dfa939c3f2404623f3b137d73fec0da54e1793e36d89N.exe
    "C:\Users\Admin\AppData\Local\Temp\a4a6df937f338b12c982dfa939c3f2404623f3b137d73fec0da54e1793e36d89N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-656926755-4116854191-210765258-1000\desktop.ini.tmp

    Filesize

    43KB

    MD5

    4a54f253eecbd479353c0846ce72b91b

    SHA1

    d698e30e0e8b71c1fd0700c54df3fd790d49153c

    SHA256

    3e9d56b94019b1238f126b62777265d967d948922173ba630de7e266a53dab01

    SHA512

    46fba43077c36c9cd971774939ff0e82224dbfeab4390ad6ec093e2bdf1fc19d8364e86bdd3ec23f29f636bf0b385f039162af5b4a7b9b369951719ccb075523

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    142KB

    MD5

    886c8a42dd4c8a76a0b1a464b42db8a7

    SHA1

    6ea79ed5abdbf54e749637597b6ae8d6abc38a58

    SHA256

    03ba17e9f24bf4b2ab012d0a59ac6c36888be792a012588eb7ebf026fcf227dc

    SHA512

    e30eaa9946a073fa23a98380489f17d29ed0744b3fd2708fec8f16bd30a21ad46fc8c97c18db782b84ad8f4e68109970d0c0cb27381abbd569410f51dbc26bb5

  • memory/4836-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4836-909-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB