Analysis

  • max time kernel
    120s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 04:57

General

  • Target

    2d764f3aea29952e3247264670489e564500d0dd33a70f86bbb5dd5c80378badN.exe

  • Size

    54KB

  • MD5

    0cde5eacdcb99cc14eb874a9d34cd470

  • SHA1

    564a8fbf70418bac1c4d49e37ea2e5678802ff65

  • SHA256

    2d764f3aea29952e3247264670489e564500d0dd33a70f86bbb5dd5c80378bad

  • SHA512

    8a29691de382685e7f5dfd16fe7ca136bb17347f3d244c13b27ea1100df840d5a3d9b8ae8e8f94a9e9336817825f8264392840f91dcca06601e6e704c6adf1a3

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJTU3U2lRtJfOsRL:V7Zf/FAxTWoJJTU3UytJfOsRL

Malware Config

Signatures

  • Renames multiple (4645) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d764f3aea29952e3247264670489e564500d0dd33a70f86bbb5dd5c80378badN.exe
    "C:\Users\Admin\AppData\Local\Temp\2d764f3aea29952e3247264670489e564500d0dd33a70f86bbb5dd5c80378badN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-355097885-2402257403-2971294179-1000\desktop.ini.tmp

    Filesize

    54KB

    MD5

    5de2d128e9cb1a322734d0bbe1b3a3c0

    SHA1

    72daecc178646d02c3a23d7775d2cb737d220fad

    SHA256

    2827e54b51023cce8d6d74564e895d2c7c92f150d243b3218a00f1408e431144

    SHA512

    afd793e7aa2e22522ec33105175973caa5097dbe9deadc7adb32a882a881aab97b03cbca13a45c6df3ee67e56de5aba42a413617974a6d5a6eb4b0e56029504f

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    153KB

    MD5

    07eb61dc46c5e4e9881e1f15c180a7de

    SHA1

    190fa39ff18305970d0d126629663868bf143495

    SHA256

    7f7de50b9e1642365eebffbf9b7bf97573184c3e018fe0c4a9e0b57a666766ad

    SHA512

    475329f9b691d3990b0a18f2977f1f4311cd0281ed407b7bb1de9ef8fde6a46ed5f559f4119c4425b37444e056aa3ce3accf9cf8228bb49bfd1c2dd331f41e92

  • memory/2152-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2152-928-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB