Analysis

  • max time kernel
    150s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 05:26

General

  • Target

    a0385c969a94ba398e172465950302fb2efa94066cef7318fb0625f17978fea7N.exe

  • Size

    85KB

  • MD5

    f57bfb8f8827d31aea7741edfc5f7280

  • SHA1

    0b13b8d793ede90f48ce88aaeecddbf3eaf20f2d

  • SHA256

    a0385c969a94ba398e172465950302fb2efa94066cef7318fb0625f17978fea7

  • SHA512

    806ac80590361fe33bed36ff23d85e5dc9a15bd110f6a9756c7d193923eab49cc8bd99b3e6f71189b3bba0de7da4d17d670f87d22b1b98fbbff3111937b3862b

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxY5gVer:fnyiQSox5/r

Malware Config

Signatures

  • Renames multiple (5053) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a0385c969a94ba398e172465950302fb2efa94066cef7318fb0625f17978fea7N.exe
    "C:\Users\Admin\AppData\Local\Temp\a0385c969a94ba398e172465950302fb2efa94066cef7318fb0625f17978fea7N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3520

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2718105630-359604950-2820636825-1000\desktop.ini.tmp

    Filesize

    85KB

    MD5

    76aa1b7625e681adc0d48cb813dd92aa

    SHA1

    81f384ff1c253d80e0efdf8a51975d17106ae48f

    SHA256

    deb66540bcb2d5ed8af05667e66eeb3fb851caf8e30080ddd096ec4ff2c78447

    SHA512

    2c8cc239e60f94827c6912bad015dc06ecd5f6a6bc8963f9db22cdf9ff1d0e41332ddb4896d21dccab47175db4f54ec6cb6b751bde2e9ffeb9b27b40508de6ff

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    184KB

    MD5

    6966967de840c1d0968a47bad6c9024c

    SHA1

    f7b71fa847b3fe29a9a38764b4097aacaa33ecd7

    SHA256

    2256b7b2c820c367a6499d8a9d0c597ed62e89f583cef7b7cc784f08e9d2e15b

    SHA512

    8c46757d1eababf86b4b5fd8b8d2c2f83560c86fa5d5cf0abeefcec8b791b8a605ce23c9c84e520927fea2d89ae5f2fd4d452f0f5dd1832f7cd3885e20f20c72

  • memory/3520-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3520-868-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB