Analysis

  • max time kernel
    120s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/09/2024, 00:55

General

  • Target

    98b13170092cf75ec6d9f1ca1283aae004760a730d258283cc87c291dde8f61fN.exe

  • Size

    60KB

  • MD5

    901201f1af0b8bd16350b211ea913530

  • SHA1

    917d6fed498b08cf9ea2910199bfdb7c63337ce9

  • SHA256

    98b13170092cf75ec6d9f1ca1283aae004760a730d258283cc87c291dde8f61f

  • SHA512

    1bef715a69e0bb2c55e0fc152b56bbabfc295358e22f9a148528fb6f50a1b50aba38e1e6d5e906d6960223a9cc0c0284dcaf8ff131d8790c965a40bf4b3eb4a9

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFze:CTWn1++PJHJXA/OsIZfzc3/Q8zxY5eYR

Malware Config

Signatures

  • Renames multiple (4628) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\98b13170092cf75ec6d9f1ca1283aae004760a730d258283cc87c291dde8f61fN.exe
    "C:\Users\Admin\AppData\Local\Temp\98b13170092cf75ec6d9f1ca1283aae004760a730d258283cc87c291dde8f61fN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-355097885-2402257403-2971294179-1000\desktop.ini.tmp

    Filesize

    60KB

    MD5

    d74a50f49514ae7cc9f4737f742c8722

    SHA1

    1b452c9f4dfab8a26980970222de70de35f913fe

    SHA256

    c8969b94ecb7c6af2e2988b4e993a99ead52fd9ecd8f3af5d6e91399caf6f898

    SHA512

    bbca74225d3639dd43fbadbd4d046d2586332ccec93c8f5608f6ed8520d4dbb5d28a1467753bf316ebf389c273aaaaf2dcb139849bab7eb7dcdcbee077fce62d

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    159KB

    MD5

    10808ae325177ba75afdc6fafb783853

    SHA1

    6d1c6ed2d6992cecf852cb647812a7182fd96ee9

    SHA256

    e466505f6d583d14edfb0b4a316f4c4f9ebf124206dee2418e7cd9967c6f5b45

    SHA512

    749afcdc62f0d9721dfe3513983be060951fd84cf83bcaa98dc31749e491e5e14e9181867d274542b50ebc67aa1e7b51b501bcd3591c532e9e4ce72f88f61ec9

  • memory/4760-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4760-869-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB