Analysis

  • max time kernel
    119s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 06:17

General

  • Target

    c4df787e0bb840daa530b4484440ef08240029e0155fa8f638947c74494e1917N.exe

  • Size

    78KB

  • MD5

    6f8a9a7a12527c9d33aee3a6bee72490

  • SHA1

    c7d6ed27abe65d522df3e818b42983718826cca6

  • SHA256

    c4df787e0bb840daa530b4484440ef08240029e0155fa8f638947c74494e1917

  • SHA512

    944fd7d39f02f358d9b2b83fee7e90bb7186192e456daf9e1f3bfc51e7da1ada9187b3e36514cb32e355d9d8f7c1f319212c92747a681b5cf9854cef3862f319

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxB:fnyiQSoc

Malware Config

Signatures

  • Renames multiple (4622) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c4df787e0bb840daa530b4484440ef08240029e0155fa8f638947c74494e1917N.exe
    "C:\Users\Admin\AppData\Local\Temp\c4df787e0bb840daa530b4484440ef08240029e0155fa8f638947c74494e1917N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2718105630-359604950-2820636825-1000\desktop.ini.tmp

    Filesize

    78KB

    MD5

    ca441620529363f05f9267326fcded55

    SHA1

    5149c5adef66d75709331d4284dde808e82e054b

    SHA256

    693fbb862ac2968a3f38ee6b16d81203127fd26bbe125fc8bf0339bdae04a455

    SHA512

    1c21ec57d9c650e78086bbf7a4f2bf51a54d887f08a4155889f44797ebb86d2797abc362fc4dea4da8d66e8ca7aa3d035579b7494890a07ddd61ec03306ba116

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    177KB

    MD5

    05233110f87f6b3203add2f7fe7f80ca

    SHA1

    b4e72d9bf046d55ed5989258a6a252abb6d6afb1

    SHA256

    c8bea48018f0022f3337c8aebb1166648a10d322ced6c330c6efc7c8ef6a8a65

    SHA512

    49ce00a031ea931d8d862a8ef08b42abc8826d7393405238dc594b8bf3ccbb308e5d3c3a2ff6c4ed8a6de865f85c69af34bbfef055073f15235da5c411c7f6e2

  • memory/3032-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3032-874-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB