Analysis

  • max time kernel
    120s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/10/2024, 03:30

General

  • Target

    c3d0671db61ff069424f05d5cfaf511a3659dd257405ae09c6d9ac57b6cb9428N.exe

  • Size

    76KB

  • MD5

    86122796e7f00b59bd5114bb6472e9f0

  • SHA1

    e776d4fb739ed7a3c2dbaa06d1d4ab7debfc05c9

  • SHA256

    c3d0671db61ff069424f05d5cfaf511a3659dd257405ae09c6d9ac57b6cb9428

  • SHA512

    bf1a075a29ee953c0ee974fa1af258c411b2c7523530ed11c653b3998bb59524a02530a95ae0f1fb44426a4dfbc1cc0ed4f8895c1b277e18378045f8ac1105e3

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8wYeHNm5EvDxfIyKoIWbsHfySkT5GeCyi348oWGO:KQSodYeHNmkDxfIyKoIWbsHfySkT5Ges

Malware Config

Signatures

  • Renames multiple (4311) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c3d0671db61ff069424f05d5cfaf511a3659dd257405ae09c6d9ac57b6cb9428N.exe
    "C:\Users\Admin\AppData\Local\Temp\c3d0671db61ff069424f05d5cfaf511a3659dd257405ae09c6d9ac57b6cb9428N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1968

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-493223053-2004649691-1575712786-1000\desktop.ini.tmp

    Filesize

    76KB

    MD5

    f0d1bb07382c81983ab847cfd3ca3420

    SHA1

    313bb52fe9232adc5bafd5bb193e7656af1a93a2

    SHA256

    caa2a3e958e21aacaca146f29d48a5769432b153eae326b6c22ec350bf465514

    SHA512

    6a6c9ce3c4d014baed776dc621fffddaa55d4918ddd58f7fd1a0c7f2c299865734bb5653e17b9f06366b5858d55d0bf102c0d0c91759bc878ecdcb1516f35169

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    175KB

    MD5

    94455a4b42ef29e0fbb24016d72e5206

    SHA1

    ca0bf44de22248a64edc15eafd6a074ce298b2ff

    SHA256

    467da581318c3217a24085bdf2ffb30a6094f4be2f5e22af2600626e877e21ae

    SHA512

    7ae23f0fc1fa5e0fb76570ec0cac0f0b7343b7b21a1032f321b76cbbf5df6757326a1d035eb06bc4c47ae273df8e020cf56710a9761aa4c9b580b0d9c0fd775d

  • memory/1968-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1968-664-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB