Analysis

  • max time kernel
    120s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 05:51

General

  • Target

    baa3518249892a7f5e368765a273efc35da1921a20e22c9a9633d250334a4d6fN.exe

  • Size

    52KB

  • MD5

    617a60682d53c10b56bf9f28a3595420

  • SHA1

    dac56d4bfa0a580103917eed9d48c9505a3f13e0

  • SHA256

    baa3518249892a7f5e368765a273efc35da1921a20e22c9a9633d250334a4d6f

  • SHA512

    45c9f43b5a4e38bbe8977288a43e0177e31fa597f6641c473b2538272504d850bb8b304bbcda4569f68ab30acedabb63ebeb554c237e1dba149abac1e8762502

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9pBlMBlS:V7Zf/FAxTWoJJ7TPBlMBlS

Malware Config

Signatures

  • Renames multiple (4679) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\baa3518249892a7f5e368765a273efc35da1921a20e22c9a9633d250334a4d6fN.exe
    "C:\Users\Admin\AppData\Local\Temp\baa3518249892a7f5e368765a273efc35da1921a20e22c9a9633d250334a4d6fN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-523280732-2327480845-3730041215-1000\desktop.ini.tmp

    Filesize

    52KB

    MD5

    6a9578c675406f5497825526dbd29e6f

    SHA1

    3c660b50c3cab3e4d5f8b476d34a6be1373937b5

    SHA256

    bff8f66f4090b2aaaf73d1cace711761c004821faba24fd698b81b67ed54a2ee

    SHA512

    7dfba8d2d7c6ac5104c31656809277436fd43b5a49a78501f10df82ae629ab649965e20a68a18f1ebce69f88c979c755c7cf183a9ffad0ee00b79cb2b96ff11d

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    151KB

    MD5

    bbdd840fa805503c6408ed601a7402d5

    SHA1

    bea79e39658ce46fabbc73f0eb70ee4d02b8a3d5

    SHA256

    1683ad6667c1f101740fdc7383c4df116152912d5309c544f24c70210456c71e

    SHA512

    eb7548eb09dbfa47edd7ca5455b5b33f3d69a4609dd6b92f01662f203caa4adea898e166233b19d55fadef2533503b5b398af7d4e971f37795e0eacbde712240

  • memory/4672-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4672-926-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB