Analysis

  • max time kernel
    150s
  • max time network
    117s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/09/2024, 20:35

General

  • Target

    012f7100b20f0497a17635b1958ee0fc9c5f2955577d9b36c25e248326934c90N.exe

  • Size

    77KB

  • MD5

    45178a4361ee92052c7de5b094ecf670

  • SHA1

    23eeb4afc145ab72bb0cbc0753f8a200fceb12cf

  • SHA256

    012f7100b20f0497a17635b1958ee0fc9c5f2955577d9b36c25e248326934c90

  • SHA512

    2bbb9643d534554af1138acee7de90a199d33240bdc7967486e6ca71f66e77a5493b0b007f20d125eccd485cb8d4abddc07ac07b9fbc72f4adb484eb0bdcdd65

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rB:V7Zf/FAxTWtnMdyGdySk

Malware Config

Signatures

  • Renames multiple (5031) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\012f7100b20f0497a17635b1958ee0fc9c5f2955577d9b36c25e248326934c90N.exe
    "C:\Users\Admin\AppData\Local\Temp\012f7100b20f0497a17635b1958ee0fc9c5f2955577d9b36c25e248326934c90N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4856

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2392887640-1187051047-2909758433-1000\desktop.ini.tmp

          Filesize

          78KB

          MD5

          7f2bd7db3dd887e2721579bf9a3c2d8f

          SHA1

          37754056c3062e61039144f623fc5ef8b4803dbc

          SHA256

          b5a8e7239c0682766a8a604c30ef2a1e88321b8247573c54e317396b31c9a5f0

          SHA512

          035dabc64c244c0ff4b402d53be888b1ad7fa87afe099fd47f223a302de206d98ce8b1371b16776f9e9a7a5e1400d2477dbb52d98dee53d37f997eef576aa734

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          176KB

          MD5

          1f29c297e2560d054c105c32da3dc0b8

          SHA1

          55f85a92dccb87f582d6309ca5025518dddbd231

          SHA256

          e7772c4c82b0d79622905f52cb3a5e75e8101bee38ea131167e20b8b79d4bd39

          SHA512

          080037fd3176010b75a47a052da352d69fafd656435e3f5c27b6116201044393018488c04858accd7bd72157a3a237468d9d2027ac66197ad759182624fd5f30

        • memory/4856-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/4856-870-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB