Analysis

  • max time kernel
    119s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/09/2024, 13:18

General

  • Target

    d69563da05225a9a3528040caa76cafad44eb5474a24974c4b09f6e8a4475cdeN.exe

  • Size

    34KB

  • MD5

    6e7e5e2f1908b3c53c06eaba7e3345a0

  • SHA1

    41de009093bfba8d3be272a13c2ec4d51f7c4387

  • SHA256

    d69563da05225a9a3528040caa76cafad44eb5474a24974c4b09f6e8a4475cde

  • SHA512

    5b311f194995642fd6052106c0848a4eecd62fb83d0f28f08ce0e13780f2b69a1b1191133dea542de528e59b0b12cbd35c5f630fb202a059e7ff5e92612ff0b1

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9K4PCs2B24PCs2BKjg:CTW7JJ7T04PN54PNG

Malware Config

Signatures

  • Renames multiple (4671) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d69563da05225a9a3528040caa76cafad44eb5474a24974c4b09f6e8a4475cdeN.exe
    "C:\Users\Admin\AppData\Local\Temp\d69563da05225a9a3528040caa76cafad44eb5474a24974c4b09f6e8a4475cdeN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-355097885-2402257403-2971294179-1000\desktop.ini.tmp

    Filesize

    34KB

    MD5

    091105e48edb59817c920ba4ad8d805f

    SHA1

    b7b7847e7b944bbe36eb85d331ad0d824f354f3f

    SHA256

    6e0c40f551e15a87ce1f51f95e64f2ea2eeb2d6f8c15ebeed02eb36cec0c02ab

    SHA512

    c2d1c2101fc0c6a627dbdea0b153c726a1d1b50d148e7d67bcb164b9d71273043b28ee66f4d65606feac2792996ffe94093c2a4997a1c0308ed3fffb705e2ef3

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    133KB

    MD5

    1e92f48a49226e8be3861f85e7974e2a

    SHA1

    ee589e36785e3fa466743925dbc2e7b746603f1a

    SHA256

    8b4ab83ecd21fb56ed56ab443ad8aff39723d7a09b3590ac8aefd4dea6a81384

    SHA512

    f6c297718513b6f72af117c7c79b08a66c3cf327d5e59bcc478b863f37ac6e0283de392f04d5f96e075d5adc2ef55c3a8a946b4efaa7119e58a3f25a5feadf9a

  • memory/3944-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3944-930-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB