Analysis

  • max time kernel
    120s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 06:57

General

  • Target

    15663be555ee19affc135c03c3ecd82cc26e8ca59461dbb5d7a03731abf2fe1fN.exe

  • Size

    59KB

  • MD5

    2370ee7bdbe16a63afeb506101828840

  • SHA1

    43da8736810d364ac1596c3c6920b2d5b797f01d

  • SHA256

    15663be555ee19affc135c03c3ecd82cc26e8ca59461dbb5d7a03731abf2fe1f

  • SHA512

    9e7793a0c29bd68362502c4af0ea10e4ef8ff9e0a6db0e052029503cca7e669272f220fa185f61218ef4f8058e96a6e0a2ceb0dfae1d9e5ed72e9ed31377c3f9

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJTU3U2lRtJfO5mdGwmdGoqAJUqAJy:V7Zf/FAxTWoJJTU3UytJfO5mdGwmdGy

Malware Config

Signatures

  • Renames multiple (4653) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\15663be555ee19affc135c03c3ecd82cc26e8ca59461dbb5d7a03731abf2fe1fN.exe
    "C:\Users\Admin\AppData\Local\Temp\15663be555ee19affc135c03c3ecd82cc26e8ca59461dbb5d7a03731abf2fe1fN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1328

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-656926755-4116854191-210765258-1000\desktop.ini.tmp

    Filesize

    59KB

    MD5

    dc1c5c47d527e5bb49426a2291364a16

    SHA1

    500514b8d25094d81f43b4af3ea6cb46624bb919

    SHA256

    12f784f1c69f2814cbd05bef19766e2f59b68a9527d6ec05ba0892ebb4c1567b

    SHA512

    43e095cccccb90f691c30eac420996390bf74db9cf57aa8adba20a5d6f930d5765ced979ef660a83202eecc0aa9bfbf1120000de962daeef22412ae8b691299b

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    158KB

    MD5

    9b43de23caa0c9b3281314529cfa8b67

    SHA1

    1f8c9840081fb9836c58e953aef7ea35f27fbcd8

    SHA256

    4a314c516e222d3420e7bc35af491ea5afc895bc8a3fe0958790fe8e98a8405e

    SHA512

    26044fbb76a9a2e1796acc093d0b3952b85ceceed8fa9c5deb65f64efb559a20e887d767252f2af56bbb64aeca380369a0ccf8ab2099da72dc3860a491ee1dee

  • memory/1328-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1328-870-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB