Analysis

  • max time kernel
    119s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/10/2024, 07:12

General

  • Target

    a83b3248df3b7c95a4c9810eb25e7bfadf85ee16722eff0a22df331bc62249b8N.exe

  • Size

    35KB

  • MD5

    c3d77bed1bc4df982849b143f48bc880

  • SHA1

    cb663cbce1b6b71f756fa44a2c0bb6b9eb0f19a1

  • SHA256

    a83b3248df3b7c95a4c9810eb25e7bfadf85ee16722eff0a22df331bc62249b8

  • SHA512

    5685784a336aa921fea954d2096a1bde2704d90258a02009adb15a7160c150507065324b0db2fefb8fd3b829ac2aae119659ea6af1a25512a5233c5d70ab99bc

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9Ro+QOViJfo+QOViJD:CTW7JJ7TPUY

Malware Config

Signatures

  • Renames multiple (4667) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a83b3248df3b7c95a4c9810eb25e7bfadf85ee16722eff0a22df331bc62249b8N.exe
    "C:\Users\Admin\AppData\Local\Temp\a83b3248df3b7c95a4c9810eb25e7bfadf85ee16722eff0a22df331bc62249b8N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:60

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-355097885-2402257403-2971294179-1000\desktop.ini.tmp

    Filesize

    35KB

    MD5

    245a0d00bf077e61eeec2a8894cd9c9d

    SHA1

    610faae39116ea9f26dcfb8399cc67599a3770c4

    SHA256

    aecf3ce11083b3a1d190fd80951781b90fece753c060131ad61685d000a8cc8e

    SHA512

    e16773ce6b41bcdc72619833620c08b5b13dc2ad24e4ddd13861055812e7e9888b658f36074be80f1edf2e9b18159e88151a44fef91b4823607e6794e0820fe4

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    134KB

    MD5

    456e7bb4e25d7bdb51eca8cd1981bbf8

    SHA1

    1106c960d82cd0e05a7f0a9523f4196d6697853b

    SHA256

    5e953641c65ebb21ae00d2d4179db953b0de08b398a7ad6a498f923e74fbd0b8

    SHA512

    94e5438cf4b1dccdb7019018d6d15e23f1ff461807912e241d686e52cc7ab6d190c04301533136e1f553d57b9aefdeab883f78fef9bbe86961ed72ce30defa04

  • memory/60-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/60-923-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB