Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 06:44

General

  • Target

    17eee4e5ea5532cff32f4f3c20c47d02bc0a090e991b8a0a433e0df97aacf1c6N.exe

  • Size

    72KB

  • MD5

    084fe60e4edf47114b9178cb26a9b5f0

  • SHA1

    9f82e2551ed00812e1b1f8b054e228c50d90b602

  • SHA256

    17eee4e5ea5532cff32f4f3c20c47d02bc0a090e991b8a0a433e0df97aacf1c6

  • SHA512

    f77b286e4eedba15f99d0acfbd75ec7a4a5b72b869f3acd4e89246dba1a45d08baabbd8cbfbca06d2cec41eec2f698dd10c6200b5054a3c399114758d9c95e41

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI982AZJE2AZJ/eBT37CPKB:V7Zf/FAxTWoJJ7T0TW7JJ7TC

Malware Config

Signatures

  • Renames multiple (5102) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\17eee4e5ea5532cff32f4f3c20c47d02bc0a090e991b8a0a433e0df97aacf1c6N.exe
    "C:\Users\Admin\AppData\Local\Temp\17eee4e5ea5532cff32f4f3c20c47d02bc0a090e991b8a0a433e0df97aacf1c6N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4182098368-2521458979-3782681353-1000\desktop.ini.tmp

    Filesize

    72KB

    MD5

    24ee512fc9bb38039496b1e9c27719e8

    SHA1

    360b6c3248dadc91c79f8aaef42e31eecaf088f9

    SHA256

    d2765238666b1eace7dabded0348ca7fdfb3e6446bbbb9c57ab041835e53d92b

    SHA512

    3a2032d525c9f8d94199c5684a3925be3fa7d42ce033dfe6aee39b606969dae453a144002bf5c0dcf58c9a59f4262dd3d3615bf8f90c58dfc2487768b1b63c99

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    171KB

    MD5

    1ec309f3590d183dc6e5b3bfa7cc7dcf

    SHA1

    f1215ff31cde7c57ef6ef013084c11aaa1a859ab

    SHA256

    9170676e7a8f259dd01e3734691ab6ce1ce9eff08d8de7ac843d2436c9f3a7ee

    SHA512

    e31380610720dc19087bcaef27f6a80d28df510dc78b495a376b1f3c2b584b3f51d345a670ae900b30826f37683d30ae7b66f0655b984f3e85de0fb896fc21cc

  • memory/2596-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2596-906-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB