Analysis

  • max time kernel
    119s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 06:38

General

  • Target

    70245462a432f2a71b48c5fa85dacab869b51e48f29d6bc9cf50b6715854d4abN.exe

  • Size

    75KB

  • MD5

    cc64a708880b5d0e95181c40e7e11eb0

  • SHA1

    a236ea858cfeff41c70800098fe6336a89612b5f

  • SHA256

    70245462a432f2a71b48c5fa85dacab869b51e48f29d6bc9cf50b6715854d4ab

  • SHA512

    a1c0abe9c5fefe97915ebb0c264cd2d2adfc823dd2bd93cf871c9531cf182e214a40b794458a199b586df06d59fa03d0dbe336dbe0c4957c4885e9f3a5a125b4

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2r3:V7Zf/FAxTWtnMdyGdy4AnAJYq8YqZ

Malware Config

Signatures

  • Renames multiple (4625) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\70245462a432f2a71b48c5fa85dacab869b51e48f29d6bc9cf50b6715854d4abN.exe
    "C:\Users\Admin\AppData\Local\Temp\70245462a432f2a71b48c5fa85dacab869b51e48f29d6bc9cf50b6715854d4abN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-656926755-4116854191-210765258-1000\desktop.ini.tmp

    Filesize

    75KB

    MD5

    51f8709b1f35a024565fde9fabbdb27d

    SHA1

    469e7c78c57e684614a99e817751fddd0dfa140f

    SHA256

    704a4d76d68901db454fe868798e875712b26bc6314af2cda4332ddeb52d5d57

    SHA512

    5ceaf254672e65386b72bab9caba2fea29dd1ec5a6399aa4bc182bfc85d65bbae978e19387199913514243eef9ae7bcaf9cecbfb927efbaac914ac482390c236

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    174KB

    MD5

    330c8e810236fd9280b49d53ec2a5373

    SHA1

    6bc627d6bb1d6724ea2182dc9e468ca9298b8fa7

    SHA256

    640d3077c7a009d5219d067663f282258efda41eb545b670bce3a3dbefd33432

    SHA512

    f35e50963092674074b5f84472708d96f2aebdeb01fe9d45a9de519368f9fbe19dc7bd65b9e5ebade89fc5a72dc018581c22abecdd67ad49a37f5a371adcbb93

  • memory/3552-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3552-902-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB