Analysis

  • max time kernel
    119s
  • max time network
    92s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 07:14

General

  • Target

    5f45e90c7b9397aaf8ce0e2bb8439c7f01d0e7d3c469508f181ba3a0fb53d0e9N.exe

  • Size

    65KB

  • MD5

    29531e364e8ccab5340875ed2c4a7360

  • SHA1

    76451b14583e058d4f69208e1619756a45bd9e37

  • SHA256

    5f45e90c7b9397aaf8ce0e2bb8439c7f01d0e7d3c469508f181ba3a0fb53d0e9

  • SHA512

    4fbaa2b7c49060eca00e2df3224f01ede9a6fd3771e4ee64b1da94f9b6129d18b47aa43a5fe266134f285feb2aeb0b1e94b13a2be8bb7801506657b182626163

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFzz:CTWn1++PJHJXA/OsIZfzc3/Q8zxY5RWP

Malware Config

Signatures

  • Renames multiple (4617) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f45e90c7b9397aaf8ce0e2bb8439c7f01d0e7d3c469508f181ba3a0fb53d0e9N.exe
    "C:\Users\Admin\AppData\Local\Temp\5f45e90c7b9397aaf8ce0e2bb8439c7f01d0e7d3c469508f181ba3a0fb53d0e9N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1176

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2392887640-1187051047-2909758433-1000\desktop.ini.tmp

    Filesize

    65KB

    MD5

    4423c33f670a73d902e431931d815bbc

    SHA1

    0b8d0e715728984e0cde49c3135874757e38ecfa

    SHA256

    8a32592371b95d93b107a7984e9d0f105289b07ea53d5ce0b8ed6f4cf8d6cba2

    SHA512

    c2d81d467297fdeb620fb19f665c19d51a6b58f83a0fc0b7bb9b313dd4058ccd3b299ac6b1a65a50fe0b29af4e70d704283bbc4a36dbf0b672e9823416c2daa5

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    164KB

    MD5

    6590b1121f12e05d1b24bcbd55e3b2bf

    SHA1

    2f928dd7217b5b8adb35c0ca4e27a12f09f07172

    SHA256

    a452f321ffa5cfd0383fcec7eac28b722e9f0d043557ae968c2062d679c548f0

    SHA512

    18af6bcc040058f34692f2079f3c95aebb90ff232927f9adf5136ecabff127e00cf74da37dcdd9d278b538e8ab3a21c9bbe653f001665e5a1423be21afc160fc

  • memory/1176-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1176-906-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB