Analysis

  • max time kernel
    119s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-10-2024 06:39

General

  • Target

    979242e9b6fedf3bb7c36b3d584e54384ab598c3d1e37f422941511d4a7f1dd0N.exe

  • Size

    60KB

  • MD5

    9549da2dd8cc918df58be60bdfee6b40

  • SHA1

    d1120087e30801c98504b652fb4eea7c90818a6f

  • SHA256

    979242e9b6fedf3bb7c36b3d584e54384ab598c3d1e37f422941511d4a7f1dd0

  • SHA512

    e5da49956eaf818fcb35c27f2ddb57c6391be2af26008edd561588dbd29c6386d18e89e67406f55b077a67ca2d0e6df83510c5b8c7c692b30cabba539393b687

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATNydWK9WKF9ADJd:V7Zf/FAxTWoJJZENTNyoKIKM0rY

Malware Config

Signatures

  • Renames multiple (4672) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\979242e9b6fedf3bb7c36b3d584e54384ab598c3d1e37f422941511d4a7f1dd0N.exe
    "C:\Users\Admin\AppData\Local\Temp\979242e9b6fedf3bb7c36b3d584e54384ab598c3d1e37f422941511d4a7f1dd0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2380

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-945322488-2060912225-3527527000-1000\desktop.ini.tmp

    Filesize

    60KB

    MD5

    2f41279b934e4ca32f5963e3ed776543

    SHA1

    1ee09b911f2685c87b8c0e1fe55604f241c3c079

    SHA256

    260f9ac28a512bca6b5247666afaed64031db6f0379eb4b5c3f79beca072579a

    SHA512

    089dce7ffc8c0829c3644a8521a4c9c66e47d0368a5d7e296b1c6ff2a5c380bf2d9c2741522f6d03f166a528ce052cc7a6175f70667f6d192eb401e0a160b0e4

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    159KB

    MD5

    c7df1d1a75b78669f915acf15617528e

    SHA1

    ca1b0567348d4c6de1f0218ef67d09c83c882618

    SHA256

    8a3e6d1a8e2bff53ae3d7d18bb0d7555da680a9711e5316f90797c56a4872a6a

    SHA512

    b053492ea8c13c5e5b6848be89d3817f8714a6602030fd0d0c09ea8b20b8b077d7c99ca8c18a0d4b3da8c4232f6e2ad12f631d2625636dd71a67d36f655b3314

  • memory/2380-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2380-1006-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB