Analysis

  • max time kernel
    120s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 05:09

General

  • Target

    180ec28a3a2e21d50fd730247bbd019a36e543f9f54e2c17b8925fcdb1b333b3N.exe

  • Size

    107KB

  • MD5

    517889e5ec8c2c08e6ee5b851a1825a0

  • SHA1

    393d888d6325f48a5169029585189efd3f0c0c78

  • SHA256

    180ec28a3a2e21d50fd730247bbd019a36e543f9f54e2c17b8925fcdb1b333b3

  • SHA512

    97666799cfc1ac4d6253bca936eec01590b3fc49eca8588538735a3bd928ab85107170e16ae3bdf86febeb6ecfbf61d02dc08d770ab2f4af42cfb7cf66bc8d27

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTNyoKIKIKNKnF3KNKnFfTW7JJZENTNyoKIKjeNep:fny1tE5KIKIKNKnF3KNKnFotE5KIKF

Malware Config

Signatures

  • Renames multiple (4386) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\180ec28a3a2e21d50fd730247bbd019a36e543f9f54e2c17b8925fcdb1b333b3N.exe
    "C:\Users\Admin\AppData\Local\Temp\180ec28a3a2e21d50fd730247bbd019a36e543f9f54e2c17b8925fcdb1b333b3N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-786284298-625481688-3210388970-1000\desktop.ini.tmp

    Filesize

    107KB

    MD5

    119d256ca4206ecd156114cb08b8f1bb

    SHA1

    7775dc6f3becf5cc8688bcd08f00b76a50c2b84c

    SHA256

    1054fdef0bd16fe560ac0c4d173727fe1a9203f66ed5b9792ef79e8eea959cc1

    SHA512

    2d81e4c23d5da2e3391c9e8fc532d314a21013a42ca3d9c58ba82371621a6f1f767a6eda0840689a5a333eae16a52e7e07b9f07524ff6c45f1a8eb976b116c0e

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    206KB

    MD5

    e8b60edaac3c49d634b29022aa49805c

    SHA1

    bc0045a57ea4855638107a1b1c38cd835b4f2224

    SHA256

    3b7d50bb0629ed65802283c10c140f0d912e9a4cceb6632edeccbd97a43a6beb

    SHA512

    5cb3a71a5921b28c528a9be40fea276bf38368253296be8f2962a090a88a4f83398f64fb9b0a4ebe069ca5924018cf09eb33aeeed5cf420757f449dd8044a53c

  • memory/2952-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2952-848-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB