Analysis

  • max time kernel
    120s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 18:29

General

  • Target

    4c20dc40e45c4899357820c20f39f0a4cf1157eb59a6be3c72dab2534c7ac43fN.exe

  • Size

    149KB

  • MD5

    b8c2a6b21c174b0161ea81869ccc7a00

  • SHA1

    853762a0162f7c076a80540d592f1862d3fe5969

  • SHA256

    4c20dc40e45c4899357820c20f39f0a4cf1157eb59a6be3c72dab2534c7ac43f

  • SHA512

    75cad3303f7874183792d1471671b281c52ed37f053e48feab9ced4698dc313f5250129c2f4977dfd9c6f2cc1dc0f50e9a4ac7a5fb923a77057ec9643b66de6d

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxGTWn1++PJHJXA/OsIZfzc3/Q8zxu:fnyiQSoHQSoH

Malware Config

Signatures

  • Renames multiple (4310) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c20dc40e45c4899357820c20f39f0a4cf1157eb59a6be3c72dab2534c7ac43fN.exe
    "C:\Users\Admin\AppData\Local\Temp\4c20dc40e45c4899357820c20f39f0a4cf1157eb59a6be3c72dab2534c7ac43fN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-523280732-2327480845-3730041215-1000\desktop.ini.tmp

    Filesize

    150KB

    MD5

    44a33bbf5c747981b3b18cfdb1d56ba5

    SHA1

    26215e77000857c06771739a7a09db6908058e54

    SHA256

    31586faed97271fb48b660abcdd08556a365242d611d08abadc9470bbd2197d9

    SHA512

    d5864068a5aa7ad5594fe716e028b0d10daf3da1fa47c3d354fe62dfe36648a980c4b729d5029abd4948f5d9d0c8b9c6275fa8c17634c25814645a2ab3b6b540

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    248KB

    MD5

    f40da066a313a65e74fbd0eb1bde1f15

    SHA1

    f2c1837b25032832a6184c8fbab9bcbf4011c93a

    SHA256

    8f6d3a9146d3b901a2fa1bcc0767b10801672f12805183da90b304d3ba91a048

    SHA512

    eb15afc630ea3360680f1efdbb72525c1f96a36919530c67af43360a4de84ffc2248ebafe9808b9d3eb9946576fa73b8bec60e81b75b718039cdc7fd5b5e6d1a

  • memory/4156-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4156-816-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB