Analysis

  • max time kernel
    120s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 06:21

General

  • Target

    142f66762c03aa015c2220afde1f4c85fd50def276f900b28630a0a3cd307a73N.exe

  • Size

    47KB

  • MD5

    9d644d202ba55bcba23720bf0e613b00

  • SHA1

    ea836919a81d673c15c8d55137e840c176b79e6c

  • SHA256

    142f66762c03aa015c2220afde1f4c85fd50def276f900b28630a0a3cd307a73

  • SHA512

    f33d44e35af6cdf833eeebedfdb6f8e431a511dd1f32dfc013642977a504a4aedfb74173e8268c47caaae82ce9b8b9ed089909b5a990bee613348c8022cbf2e3

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcuvoE2OiJfoE2OiJo:CTWkySSh9j+9jpGnrBCBMxixa

Malware Config

Signatures

  • Renames multiple (4653) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\142f66762c03aa015c2220afde1f4c85fd50def276f900b28630a0a3cd307a73N.exe
    "C:\Users\Admin\AppData\Local\Temp\142f66762c03aa015c2220afde1f4c85fd50def276f900b28630a0a3cd307a73N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3176

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2629364133-3182087385-364449604-1000\desktop.ini.tmp

    Filesize

    47KB

    MD5

    e9488831466d6e334072b2cf48e201e9

    SHA1

    2352cb736093831dd00b1848716c04935c31bf5b

    SHA256

    ac21694164f611a78d228892362846d88fea58d5586ac63884daeeca4150c3f9

    SHA512

    2c32053c549694db7b25a2fe0867e3078ffa68c0d5bd260f4aa7827d02adcc3bec709052e0baf05784acd9be50e4608c826606da8517c6d2c3c734a852bd3a29

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    146KB

    MD5

    d9a14dab80bd86709ddaf33e9db65e0f

    SHA1

    fc1dce2b9c224a00d97b49637603ca5f1a6b728c

    SHA256

    2e2f865151bbd53711e5a4172d4fc3c5a27fb4ac80dd94a4a2c2a3970c382229

    SHA512

    85ab313b1fd33aa5b47603bf9088d67d50d8093820ec85e0ea146ee7d4591db8b128b65aa0c8f658b7472b4ccb89622c98280652337fcc878ec552247177b56d

  • memory/3176-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3176-786-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB