Analysis

  • max time kernel
    120s
  • max time network
    91s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 06:42

General

  • Target

    4e50b77d29c2599e210879ba49eb34ff9528d8630e5b9954b4f46f97c7fb0648N.exe

  • Size

    49KB

  • MD5

    759939055cbb45e422cdc30fff666980

  • SHA1

    524dde338058db9a6f0079e2b81a0d71b56e88a8

  • SHA256

    4e50b77d29c2599e210879ba49eb34ff9528d8630e5b9954b4f46f97c7fb0648

  • SHA512

    e334f9b28838146379a37cdd4f1c8966615f8256a531ab8409b626cbb14bdb6052639b1aed2f9943e43b240ac34b0ab868c162e06d57d16f204c0f96e3f72cf5

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcu90TKe+0TKeinMds:CTWUnMdyGdy4AnAJYq8YqiXQ

Malware Config

Signatures

  • Renames multiple (4655) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e50b77d29c2599e210879ba49eb34ff9528d8630e5b9954b4f46f97c7fb0648N.exe
    "C:\Users\Admin\AppData\Local\Temp\4e50b77d29c2599e210879ba49eb34ff9528d8630e5b9954b4f46f97c7fb0648N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-656926755-4116854191-210765258-1000\desktop.ini.tmp

    Filesize

    49KB

    MD5

    7f5703e46c77793851a2c7a48185c6ac

    SHA1

    0403480d1bdc5252db4b00d08494dbe3534bfe59

    SHA256

    b6c9ef116c4f3ae9c23847299aa740196d354468b801bec1bfcea4e30e9250b1

    SHA512

    4c422ecd4d9003fb0884a4decbf89e1736cdf9e3aecad45b116e4c469f66dece056f78944801ad984c58de265957231a30c3100eec66ab5e910ffc527783dbeb

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    148KB

    MD5

    14e69d6c30349b841f60bfb5ef00498f

    SHA1

    d63eb5e245043f05166cfec8b2ac5abe1087c228

    SHA256

    260879cb8625de199c4d386c949a8df17ac56afef479be8dee2be3b47fe9f7b2

    SHA512

    63d88ff05a2be96e25bf31fcf174427aed546b18b04ec042d66d1c2c99d5a110c7800046a613f7e436d77c4a49740ce69ed40fcdfa110c060c298763fcca6368

  • memory/3572-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3572-899-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB