Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 05:52

General

  • Target

    a93bb67070d577472f2bf294b212021062199694844c48aca4a95b8e6cd4e470N.exe

  • Size

    103KB

  • MD5

    dd14d1d89d2a55849981d8d8feab39d0

  • SHA1

    870d89b0f2f735494a5f0b671dccdca01cfb247e

  • SHA256

    a93bb67070d577472f2bf294b212021062199694844c48aca4a95b8e6cd4e470

  • SHA512

    c6a7984424e5de198d711672aae86b24ed609dfde96025e3c9b68dc2dc416423d9a7ecc4551b1731dd3c588b314a036f89b655d34a0a7e3bd28d4271387b652b

  • SSDEEP

    1536:V7Zf/FAxTWoJJ7T8VseGZvH6Ng6kxyQbs5Otr2DVdZOwo:fny14VszZvH6Ng625/SpdZOt

Malware Config

Signatures

  • Renames multiple (5017) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a93bb67070d577472f2bf294b212021062199694844c48aca4a95b8e6cd4e470N.exe
    "C:\Users\Admin\AppData\Local\Temp\a93bb67070d577472f2bf294b212021062199694844c48aca4a95b8e6cd4e470N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2718105630-359604950-2820636825-1000\desktop.ini.tmp

    Filesize

    103KB

    MD5

    86ac2e9d913f17178aa7ea38356287d4

    SHA1

    8f3e662e707e8ef21b479abf55f3a626aa3f95bf

    SHA256

    e51eec13c34d967810263eee07105591e52734fbb375352ea7befb8812818149

    SHA512

    611fbb1271e4c8e43bd0baf4bb5ada437adeddc9f365d515eec82fd7fd68f75613fab71fdac0679fdb51621dced476dffdebc296e72efc97ddacfc1a891a8d4d

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    202KB

    MD5

    f1445540963c79e085ccaef2f2e0aa44

    SHA1

    c9cb829d5f937fdb2936bf8de1e4fc44a4f307c4

    SHA256

    6d76c8d1b046f0a50a0b265ff084ccec663754bc0599cfcf027ec21597010b06

    SHA512

    9427d4ce5c367b33e1adaf81878702a1d14425ddc46afd96145e70659199dff16c67343620893ab7974f9c51ec7582942801d42cf190946f1476b54d08e2456c

  • memory/4752-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4752-858-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB