Analysis

  • max time kernel
    120s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-09-2024 09:26

General

  • Target

    a8f58291a709b834a154ab5c53d072b7845f094c18d3d318653d9ab9b2b5adb0N.exe

  • Size

    41KB

  • MD5

    a0070aecc1a988cfe8617f4c9d6e4090

  • SHA1

    1457fdc12c9f562a03c3ee2be572e3638fef1da6

  • SHA256

    a8f58291a709b834a154ab5c53d072b7845f094c18d3d318653d9ab9b2b5adb0

  • SHA512

    7175b4df53dd67f214fd16a9cd3add83291d925f193fd54f4afd83ddf7ed7efc4d2df656a09f323458589418a67b52c980264daf77999be9a2d07a4b6eff492a

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcuvoE2OiJfoE2OiJ1:CTWkySSh9j+9jpGn4

Malware Config

Signatures

  • Renames multiple (4692) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a8f58291a709b834a154ab5c53d072b7845f094c18d3d318653d9ab9b2b5adb0N.exe
    "C:\Users\Admin\AppData\Local\Temp\a8f58291a709b834a154ab5c53d072b7845f094c18d3d318653d9ab9b2b5adb0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1302416131-1437503476-2806442725-1000\desktop.ini.tmp

    Filesize

    41KB

    MD5

    f7f71f7426a53e114dfb7c50b39e54de

    SHA1

    c8acd3872a5d64648ed695fb809a38ea47a681b1

    SHA256

    414a88503137a79520cfcacaf6f202141e4e89919a8b163660a7b03b56d6bdd3

    SHA512

    6c943a6b55a8db4d4bbbe976b2887e8ac1adbb52c2fdbf6689460d74d525131bfdf71efdf68330b4e2eee75c738e211e5bbb71d7101e5d4cf6b2e8549739c41a

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    140KB

    MD5

    390f959bc22b53c7e6d166b12fd6f086

    SHA1

    e7e63a731149ef6771fc23eeeff3a3fd5812835e

    SHA256

    e3c3473c26f3a6a31013276903eafc6a968baba1db1617be39f859876aba8aa3

    SHA512

    084ea7f6d630e9f0d532857dd6139f5c63fe956d01076bd59613b7ec16810d27b1245c6de50c9950b56afe6d0658aa8e62fd825dc5c680ea0191359a452c689b

  • memory/1032-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1032-1038-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB