Analysis

  • max time kernel
    120s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-10-2024 18:45

General

  • Target

    2c4e3d0dbf58d48eaf8746eaa95fd811908321ada19616c0311a83cdea14ce81N.exe

  • Size

    56KB

  • MD5

    f689b4f01612802ab400263c4e741f40

  • SHA1

    8da3789a82459bd98eac61eb3d3696a3d78364ff

  • SHA256

    2c4e3d0dbf58d48eaf8746eaa95fd811908321ada19616c0311a83cdea14ce81

  • SHA512

    d1284b68061a188ae16bca445a776d8898498ffe803920d186157f87a589606eac0b7d8b3afe74c4b77bde34561ba806ac466f23ed60017afdfb712abd90c3e6

  • SSDEEP

    1536:V7Zf/FAxTWoJJ7TPUr8p0IhAFV2RuH220IhAFV2RuH24:fny1zUz+6V2RuH2j+6V2RuH24

Malware Config

Signatures

  • Renames multiple (4656) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c4e3d0dbf58d48eaf8746eaa95fd811908321ada19616c0311a83cdea14ce81N.exe
    "C:\Users\Admin\AppData\Local\Temp\2c4e3d0dbf58d48eaf8746eaa95fd811908321ada19616c0311a83cdea14ce81N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1194130065-3471212556-1656947724-1000\desktop.ini.tmp

    Filesize

    56KB

    MD5

    b2797e480aa630feb4a7b9ddedc6fb8a

    SHA1

    931771bb4c4e44ed4416451a91e1812487b585fd

    SHA256

    48bac9de6ea26033901717b9f01126aa34d7fa6a49c0afa97fa4c362bf7ac8b3

    SHA512

    3559a1590fe816c13664f711dab7e57a0fcb8576d45746864ec4793c14f412e2ce2f45bfb83b7f9c07fd765271fd37efe0fdb6babb2cbbe5712fdc7e044cb964

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    155KB

    MD5

    39d10196a3fb88df1b23c9f7e6bdbb1e

    SHA1

    7f15f48a90b675e03ead410b3ba5504fbd1327b3

    SHA256

    913696172aa0959a4b3808865bed723d9f4df094eb9a9aba99975eb020107203

    SHA512

    6fb718092aab75388e379906fd669c3a29101e5327ff4020b118c1edaae57db2a99d063f42652a3c787dfc378f7e806d3bb54916a97d5d81798397650cc3b513

  • memory/4716-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4716-912-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB