Analysis

  • max time kernel
    119s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 06:44

General

  • Target

    4947327436dca96bfd56fc4b7d258d319ed5c1dabdc000875c8b06b1638be68cN.exe

  • Size

    141KB

  • MD5

    c9ec3a35e50bab71e4b1a66312f4c560

  • SHA1

    525c49bb63dd97bca819d4af48c001163679115b

  • SHA256

    4947327436dca96bfd56fc4b7d258d319ed5c1dabdc000875c8b06b1638be68c

  • SHA512

    df9b8c8405b2a0e96bd9ec736a902a3f6f97625df570d150d350460a63f00af58268c3e12f7969fcc74eb68e3998611c0db1133bb9ccf8711ab3af747b0376c5

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8IZTrQOv/i+vrA+SCm7x1wzz:fnyiQSo7Z7ni+9m7x1wzz

Malware Config

Signatures

  • Renames multiple (4321) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4947327436dca96bfd56fc4b7d258d319ed5c1dabdc000875c8b06b1638be68cN.exe
    "C:\Users\Admin\AppData\Local\Temp\4947327436dca96bfd56fc4b7d258d319ed5c1dabdc000875c8b06b1638be68cN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2718105630-359604950-2820636825-1000\desktop.ini.tmp

    Filesize

    141KB

    MD5

    619ce79600703c0f1d07acfff60be22c

    SHA1

    becd419ba664078a47cdea0f2686c4a40357342d

    SHA256

    d699bf8d087c2888c58e89eb10a79ee5f0d047c4da01822e6a1fb5c2642266fe

    SHA512

    316bdaeaf0d181bc5316aa967eba6ce40fe1d7a21f04f53af6f9e8aa02b0f3ed95d72c34120f047a081633cdc1361612df2fca5a19a262b09a8616325abcbebb

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    240KB

    MD5

    745a710627bbfd02c59809b187611254

    SHA1

    88816e9ca855538bb59c1da78ee2abbb6c3664c0

    SHA256

    4d92cdaeea3c78b103181cac91a802367351cfac4ff503ab1eebe18f0d47e2b7

    SHA512

    f57abcd1dc6224a84316be79002100bc984ecc60fa8f06bf0a558b05b89ebce1d7c5776fa7f35ebe0df34ab5724cc34e03c8ff7c7165fce8aedede64abccfbac

  • memory/4820-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4820-806-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB