Analysis

  • max time kernel
    119s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2024 01:19

General

  • Target

    2897a7cf01455835417ce63f2cfcd3855de43b2f4c19b6f87bd5a932c88d3e1aN.exe

  • Size

    44KB

  • MD5

    d73f36c64bb464f822ecbd926517af80

  • SHA1

    859e3962834df3ad16caca0e0bde5030bd4cfa71

  • SHA256

    2897a7cf01455835417ce63f2cfcd3855de43b2f4c19b6f87bd5a932c88d3e1a

  • SHA512

    da0f2904a6e87e8a63864dfd6717cc1d507e08d9ba6ae1057a949339fb30a2f94bf39e045715dc5566e409122dc76a4ce81c18248e7951b0a8ed4de1b23cd360

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJPbUEobUE51lRtJicszsOVCXb9CGDb9CGea7Aa77:kBT37CPKKdJJTU3U2lRtJfO6CQCM

Malware Config

Signatures

  • Renames multiple (4648) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2897a7cf01455835417ce63f2cfcd3855de43b2f4c19b6f87bd5a932c88d3e1aN.exe
    "C:\Users\Admin\AppData\Local\Temp\2897a7cf01455835417ce63f2cfcd3855de43b2f4c19b6f87bd5a932c88d3e1aN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2412658365-3084825385-3340777666-1000\desktop.ini.tmp

    Filesize

    45KB

    MD5

    66cb642398b91da529ae7e76d2b2d152

    SHA1

    c4a2a2a03f966a6aa2d5b764bb35c7c62ee68649

    SHA256

    6b18df52c1f83d4bdb474566e24beda49a16d6b82abae6e4065b5a7c0ceaa138

    SHA512

    9c30ddbe5ed52e54a1b7ee41e360439a01d49c40b5b21059438956c19280a3d76d6e243c15e60531ca1e5eb46d8d04ee8274f918e5029cdc6a5a83c1d644211f

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    144KB

    MD5

    3b9853ad4210737dc1f117e3622fb5a6

    SHA1

    b076d9a510e2e998f9aebf12d00588dc54664862

    SHA256

    4db3e62b53e171accc0c4242cc72f6f843901a4d7faa78735454ab02f2f62a75

    SHA512

    7b8571aa4bf006022a442949cd68046138be74f7bba32a58388b3d2490b8641b87f286110e4877fe832d52bcea8c54276593bac0e4f3e5e97e399c5824ac884f

  • memory/3432-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3432-900-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB