Analysis

  • max time kernel
    120s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-09-2024 01:16

General

  • Target

    5e6605e4443865ab374785d7b5b66c476d0e98a86237cd40dbc492a2c7647793N.exe

  • Size

    135KB

  • MD5

    91e51fbc7f398adf98740c15942dffc0

  • SHA1

    dcb00631ed49904869a6a7840d8588747efa038e

  • SHA256

    5e6605e4443865ab374785d7b5b66c476d0e98a86237cd40dbc492a2c7647793

  • SHA512

    036ff61780385155f5df11489ec227c08d84f7c705534e8bf8d84ea2bbe102040e63fe1527f4a99a72286358351b18a768edd45b02373391023ecf244f420e66

  • SSDEEP

    1536:V7Zf/FAxTWtnMdyGdyQPQWJZ8JMl0YkBLwNoUgSEyvzNa:fnyGnarJAYktwFDbo

Malware Config

Signatures

  • Renames multiple (4231) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e6605e4443865ab374785d7b5b66c476d0e98a86237cd40dbc492a2c7647793N.exe
    "C:\Users\Admin\AppData\Local\Temp\5e6605e4443865ab374785d7b5b66c476d0e98a86237cd40dbc492a2c7647793N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2392887640-1187051047-2909758433-1000\desktop.ini.tmp

    Filesize

    135KB

    MD5

    56d06532de865c5553bfe5db011a5a85

    SHA1

    5994cd291e77b96ed7a24f15c6685fb3ae4412a3

    SHA256

    542358cde4b9d522008ff8cb0039694df5a35cfa6118d1f1479706a8d5c037f2

    SHA512

    77321b94b2152a81d6c0cbc0ce26787560adad9d4687f2a29e777750cd5357907c2773b7d6a1dc1b271c630852f7608deaa020e7a9380dc2b5beb6bdb667f881

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    234KB

    MD5

    9ab518d0bd53ec787aca50d1645311d1

    SHA1

    806c90180e5d754c7b1f8a02a62e35f6255f544d

    SHA256

    696b6ae23b27141df991a0ca5446f33f30b3118c19f0652c8b9c422a59b4d312

    SHA512

    cc120f45ad79913174d4a0c004799f5ee93a020cf25929be44e0266e8709df9717b75143f5f15b3dc377705b015c4f7eb5dbc8320c2c1643c170f696eb1708ea

  • memory/4596-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4596-794-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB