Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 06:29

General

  • Target

    0e901a3e681797c2dd03c7f776d010c341bd7a95eea451eaa9a7c05a4dfba195N.exe

  • Size

    25KB

  • MD5

    9530aa266e909ed54d97446b13bfdd80

  • SHA1

    e810788c571ccd3291808586f02a0259cec8fe56

  • SHA256

    0e901a3e681797c2dd03c7f776d010c341bd7a95eea451eaa9a7c05a4dfba195

  • SHA512

    373cf6b7ebcc81df68d926e593a183d862f789b023babf7713900bdac03d3c8ec6bc2d2eeb5bf0073c097a952e8f48efe446bf22b681e4a06a96be63a100a59f

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9KY1YI:CTW7JJ7Tt

Malware Config

Signatures

  • Renames multiple (5200) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e901a3e681797c2dd03c7f776d010c341bd7a95eea451eaa9a7c05a4dfba195N.exe
    "C:\Users\Admin\AppData\Local\Temp\0e901a3e681797c2dd03c7f776d010c341bd7a95eea451eaa9a7c05a4dfba195N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2718105630-359604950-2820636825-1000\desktop.ini.tmp

    Filesize

    25KB

    MD5

    98c79ec77e24e7610306256587158390

    SHA1

    573244a7cb5dc13030e4cdaa4ed5569dafc9c48b

    SHA256

    b2593af16aa2c887d0352b9789f8272b8ea03645c544939a3cb0ee3ed3c6af60

    SHA512

    f36fa705bf25481bc8ca0cefd3150456cd8f4434d54e6ed24e6e0d412d665443863e419c7141b40b321854c436f556806a2bd1a5d30937bff45672eeb6ccc325

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    124KB

    MD5

    0ebc98eb1e277fc212c24d320e402b53

    SHA1

    3be8d9980aa8eb4c824cfdfeead270b1fdabb09d

    SHA256

    d191fdb7b892f857170a42c4b1fa89a75d79749d022afa1b21bd6f414595febc

    SHA512

    22ffa95976728809f94f727e5c94908beda3bc78ccbd9cf9d44033534e8b76aeead89ef2f6edd6fe73464d94ef9d31f874b940d59f8e8d2ed49611f92f28067c

  • memory/2540-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2540-1016-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB