Analysis

  • max time kernel
    120s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-09-2024 09:26

General

  • Target

    31f394aba7f3b7a210ef6fcfe6dc4a5a8215b63e602f402d220a3768a8d2a3e8N.exe

  • Size

    50KB

  • MD5

    bc1168de1f1f89befcc608f29a6b1c20

  • SHA1

    9b940a1ea4f4423a77f4094fc27eb7bcaab4fb26

  • SHA256

    31f394aba7f3b7a210ef6fcfe6dc4a5a8215b63e602f402d220a3768a8d2a3e8

  • SHA512

    df91bb05cc31ae39f1194137b8ac196ddbd18be2bdaa955f5435f20cab55dd3fc9f133571bfc830d161973f817964eb491ad1568f7790041cde8c91fb72aea98

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9ARFRX:V7Zf/FAxTWoJJ7TC

Malware Config

Signatures

  • Renames multiple (4672) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\31f394aba7f3b7a210ef6fcfe6dc4a5a8215b63e602f402d220a3768a8d2a3e8N.exe
    "C:\Users\Admin\AppData\Local\Temp\31f394aba7f3b7a210ef6fcfe6dc4a5a8215b63e602f402d220a3768a8d2a3e8N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1256

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-523280732-2327480845-3730041215-1000\desktop.ini.tmp

    Filesize

    50KB

    MD5

    fab01ef93495d4e756bd4c22636246c4

    SHA1

    3b66cdf5e95ddcd9dfe90abd399f19900b00eb4c

    SHA256

    aac7c9c6fc4c65d41658356fcf193d1edbd40264a11944cefda58584694a39f2

    SHA512

    0b45cb8e3120cf7bd91bbc03e18f5d469aa9a1cb809b05c2e584728471762da12f17880cf988e1e2100da7a7004ccf6c43e2fe71cf7f2ba5a07a5dc04d64f3df

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    149KB

    MD5

    a2418698db4bcc7bfb86d12494f9f593

    SHA1

    fa0d0e4d7e9602bd4599a8692f845bd683d7bb7a

    SHA256

    b57f101ec6ff505a2d6525f0b6357f6f5a01e0a27bdc6ea394924ccd5feee17d

    SHA512

    2659f8eb4172e858cbd44af019b30c3936bb4da9508ebf5497a194ef5701ca28885ed9515092063d586308fd2a5e95ac2f3111e8fb52bbd8c817366c1a07d69a

  • memory/1256-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1256-1018-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB