Analysis

  • max time kernel
    119s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 07:13

General

  • Target

    7a0993260a14e3119578eafe5530f689a506d7376aaf2900b1e0a1b3239bfa36N.exe

  • Size

    59KB

  • MD5

    c40ace3b78dd231eaf43b73512174fe0

  • SHA1

    8abff1ff196a2ffc35c4a6dceea04323baa694ef

  • SHA256

    7a0993260a14e3119578eafe5530f689a506d7376aaf2900b1e0a1b3239bfa36

  • SHA512

    412103a42f6ff9e80537e2bb30db7f0a094fedc519da6a560ef0be153bc11d7abff0eb44489d9c93a6abcf7352542c144a20619bfd83f5f91510f6e10bb22842

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9tyC:V7Zf/FAxTWoJJ7T7yC

Malware Config

Signatures

  • Renames multiple (4658) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a0993260a14e3119578eafe5530f689a506d7376aaf2900b1e0a1b3239bfa36N.exe
    "C:\Users\Admin\AppData\Local\Temp\7a0993260a14e3119578eafe5530f689a506d7376aaf2900b1e0a1b3239bfa36N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:388

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-786284298-625481688-3210388970-1000\desktop.ini.tmp

    Filesize

    59KB

    MD5

    05471f44fdc581c30783451da7dfd179

    SHA1

    e4ae4b65be16b939ec65a12eba82082eb542fca6

    SHA256

    814946bc3c2ab32c81548ca82988b356a0e02190a79d42f9d05e2bf8c5624fe1

    SHA512

    9823f59f846174e655c22ac240b018aaa5f4e29c674314dfacc9c8d1a30a34470e12185fa96aade014d5a9a823e87508bf9f609332457771ed3d60bb51695ae2

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    158KB

    MD5

    544b7172f1ede25c2bc12a4431ba03ee

    SHA1

    d185d4a843e89d3d16d60569357f5ed26abe0182

    SHA256

    12e7e1cbd1d5fededca07ed5cbe6d8a4c2bcf11d766005c9c03a0e0466aeceb1

    SHA512

    4641b14c364d309f982d6d94f1b80de87c9a784ecddacf5af8ee9b8d5413fbead5694090b65e57964c9f26896030d1947135706e7e67c24f476c2a8b837fecd2

  • memory/388-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/388-960-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB