Analysis

  • max time kernel
    150s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/09/2024, 20:29

General

  • Target

    3c420e54acd6aa950d23b14b6aed8f91771360b0076a1cce46b8bfbc7aae3000.exe

  • Size

    55KB

  • MD5

    4505ca688eda0faffbdecf48a9e6ba91

  • SHA1

    b743d0e3d71944c6a4657d90e21c92855236240a

  • SHA256

    3c420e54acd6aa950d23b14b6aed8f91771360b0076a1cce46b8bfbc7aae3000

  • SHA512

    1ad409c756d2d25eb5d862c7839369e1849329a45a52dfa0174704a46ecfaf607360aa9b141dbcb1dc1d4cee455363322628aa46ed283ddb2c17d09e35e25903

  • SSDEEP

    768:kBT37CPKK1EXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rcu90TKe+0TKeinMdj:CTWUnMdyGdy4AnAP4YrMe

Malware Config

Signatures

  • Renames multiple (5192) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c420e54acd6aa950d23b14b6aed8f91771360b0076a1cce46b8bfbc7aae3000.exe
    "C:\Users\Admin\AppData\Local\Temp\3c420e54acd6aa950d23b14b6aed8f91771360b0076a1cce46b8bfbc7aae3000.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1302416131-1437503476-2806442725-1000\desktop.ini.tmp

    Filesize

    55KB

    MD5

    365f5da4070b4c9e9b2077df96590bf4

    SHA1

    e078c625d88bfe859c4d2040cc5e81f6e662c667

    SHA256

    c7e16741aee1be2f1e4b5a461cf9edd8edda131c86ed88be2843788cd2a4f419

    SHA512

    d8de5e4cb13e0e24fe7111ef0096861baaada1defa65e63d35eef8180dc8210ac85bb48b915624ecb3da23861ebda23fd34101e4840a7eb02e54ea7e6f6ac92d

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    154KB

    MD5

    d10d2c87c2b697dfacc19c9bc7e747cb

    SHA1

    47598f5305dc0f65396fcdba7275cf37f99b98be

    SHA256

    925c4de3b7a1d28a1c368cad48b3e594575c74465a55f4bf9d56aeb401e268b1

    SHA512

    4deb171c40cc3f21ddafb85a3d6e8d1806f99ae1233745c0d7fc18074ef9bae4462ff2b66c164b50175bf03706da988b38dac60208d394dfdde778a60b732e76

  • memory/1612-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1612-969-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB