Analysis

  • max time kernel
    150s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/09/2024, 16:07

General

  • Target

    1af25448d576eab96fc2db5f3f2224fc5a287792958fc09b09c456018a20a8e3N.exe

  • Size

    26KB

  • MD5

    64dce36072f614ca37a8bd94cdd924f0

  • SHA1

    de67673ba01545d862d6fa84aa31118763e90c6b

  • SHA256

    1af25448d576eab96fc2db5f3f2224fc5a287792958fc09b09c456018a20a8e3

  • SHA512

    45d25d64a2b64c0253385720feabd83231ca184224f76fb4d8e91db1b8413d1b935d55a7a13d36f8df31137a810a27726ce6c0ed16032e71048f0d8eaf58ac33

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9XZSZx:CTW7JJ7T4

Malware Config

Signatures

  • Renames multiple (5323) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1af25448d576eab96fc2db5f3f2224fc5a287792958fc09b09c456018a20a8e3N.exe
    "C:\Users\Admin\AppData\Local\Temp\1af25448d576eab96fc2db5f3f2224fc5a287792958fc09b09c456018a20a8e3N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-945322488-2060912225-3527527000-1000\desktop.ini.tmp

    Filesize

    27KB

    MD5

    b27514cb8bb548d61179d3bddb702aa8

    SHA1

    4c7ba7106beaab0f1ee7b606db567ed8bfd7f37a

    SHA256

    43eeacc72f29824f2872b963865dcff299a0284c3e8807cfd56baa26fbbf72d0

    SHA512

    b06b4ba0a0cf69853a2066661f45c5b1d0039a261037c25de18ff66ef2f5b6aa0e86f831c95bbdf0423ee2c57e7f1dfcc01ff88349768626c24433fd456510b1

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    125KB

    MD5

    845e10840a0590e545d674f393042e0a

    SHA1

    504d95eaa6ee2b54b804da64159cb5e0745c2c34

    SHA256

    8af1fac6fa5b1d54f6173def07d5518052620ee3bb6ee172c6a5c03bf268f286

    SHA512

    1bec063fa7a460286cb60aff336e1bf12225c2cede8ae783a426b60c67c60d651278544378b1033fc7d46fa6681497885592f95792d894329889013f7cffa99e

  • memory/1772-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1772-1020-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB