Analysis

  • max time kernel
    150s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/09/2024, 21:39

General

  • Target

    518c735b675d5e5956d20b06ff89b7b4b3f65ad56002c8e9fc25594fcbaf6078N.exe

  • Size

    51KB

  • MD5

    d10353421f63b69daeaf17e6fe490af0

  • SHA1

    80d165d2370c5a81e4c43664d24840763bc7602f

  • SHA256

    518c735b675d5e5956d20b06ff89b7b4b3f65ad56002c8e9fc25594fcbaf6078

  • SHA512

    eaa207a8628c203bf2b3d38937fe7abb935b14b7ed9b9586e04edeb034189e62a906acb11613de3a89c9ee95890e9831aeb4567959ba7f647002ff4dbc929a9d

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9Ro+QOViJfo+QOViJY8h:V7Zf/FAxTWoJJ7TPUr8h

Malware Config

Signatures

  • Renames multiple (5195) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\518c735b675d5e5956d20b06ff89b7b4b3f65ad56002c8e9fc25594fcbaf6078N.exe
    "C:\Users\Admin\AppData\Local\Temp\518c735b675d5e5956d20b06ff89b7b4b3f65ad56002c8e9fc25594fcbaf6078N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2496

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2412658365-3084825385-3340777666-1000\desktop.ini.tmp

    Filesize

    52KB

    MD5

    412c61fcca4aafe92de9fc8ad69783d6

    SHA1

    8e178b6a2520262a0c2118efb3b7b415ed913fc6

    SHA256

    e7dcec399c7e8d0d4646c642c5400f5c51bfe3c9878a977f1dfd98a7722052af

    SHA512

    af17e31b9e14e19512554930e116231dd838a2e37a74fa0308f06b6e6c650a64c7315ecb04b08f9cbfd98474eb2f55befb9773db3688c2238b9e5d6952121b4c

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    150KB

    MD5

    9e273633c17025ddd3b4f93c2db184fb

    SHA1

    452a140b9189df4221d599e5102a20555748d71a

    SHA256

    0be359a9219418502c894ee1139dd85ab137a7b22b3c5d3c434c88b2e3b1638b

    SHA512

    a76c78335a06cec61a595ea000ba2974d11be1a775fcb52094f177bb22152c6b20e90c8fc48d5d4aef0ff76a97382cc16b57bb75b8c619feb02341302417bd5a

  • memory/2496-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2496-902-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB