Analysis

  • max time kernel
    120s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 03:35

General

  • Target

    2a10353cabacd72a2aaeffd2ae536713bc1067d87ba3f911eeb4f88d0075e820N.exe

  • Size

    61KB

  • MD5

    7a7b2805e3a1a62d0ac08c9f7329ed10

  • SHA1

    65ceb41701828f059f1a0456c01e8c1106c53b63

  • SHA256

    2a10353cabacd72a2aaeffd2ae536713bc1067d87ba3f911eeb4f88d0075e820

  • SHA512

    519ad94850d813e2f05d2a03b665fe97d68a8e7d7738668a831aec23e4698e4ab37890eaf237c8b1c2daf42da6642969aca76308c839f1d844f86a08ca5dcf05

  • SSDEEP

    1536:V7Zf/FAxTWoJJ7T/WG3HK/D5zf6ydyf+abMkF24kzK3jbrCkoRJNDZK/D5zf6ydx:fny1/K/D5zf6ydyf+abMkF24kzK3jbrH

Malware Config

Signatures

  • Renames multiple (4641) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a10353cabacd72a2aaeffd2ae536713bc1067d87ba3f911eeb4f88d0075e820N.exe
    "C:\Users\Admin\AppData\Local\Temp\2a10353cabacd72a2aaeffd2ae536713bc1067d87ba3f911eeb4f88d0075e820N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2388

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-355097885-2402257403-2971294179-1000\desktop.ini.tmp

    Filesize

    61KB

    MD5

    202f1bd12279c983cc3cb1295ff03f57

    SHA1

    62df1c8760dc4c2d55ba620da7498f22f80c11f9

    SHA256

    d4798858d14ffcfb16781df610b4408abf3b43cd6d254aa6aa22771c8f7f3235

    SHA512

    6aa5d9d591d3fcf123e0468d633ef35554c801f5bc7a0c0860aa688b6edcc1c5a4cd04c930fbbcc4ef58d106df3b53d6d231982ed3180ff87fff92d6a7b52de6

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    160KB

    MD5

    313066faf87076f6317bf6dbfb7e1bd8

    SHA1

    f8e95b947674afc09139f27db395522f5140a0bf

    SHA256

    a888fd82f6e9b258e3410f63be0dc7268cc266489459c2b82f4d8ffa074c70fb

    SHA512

    e4fd51605a7d3ff167b272d9826e7f47f74dd3a567efa2212be93bdc41787cc0cd127b7aea232c53f9fd8de8f85fffaac31de60e3179759dfdf806e2df004eec

  • memory/2388-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2388-874-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB