Analysis

  • max time kernel
    120s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-10-2024 17:12

General

  • Target

    b89a432e0cbcb7773a1d8f852beeb811760f6489cf1ceddd0834fcf811cd8252N.exe

  • Size

    69KB

  • MD5

    e2aad802d2e55308b85a4fd6dc6dbe60

  • SHA1

    22c5577e977c7ea045b2ed0846e569045764c43e

  • SHA256

    b89a432e0cbcb7773a1d8f852beeb811760f6489cf1ceddd0834fcf811cd8252

  • SHA512

    9fe326ddd099a9352cc35019ce97b69b90c473ae4a0e0239bf4fa2c78b64586f88253ae0f80b13ecc2d2ad890d2b7becc0930c81267e51739e3af25a28ed0dca

  • SSDEEP

    1536:V7Zf/FAxTWoJJ7TPU2XPYFbIhbaJuYnQ1v:fny1zU2Wc

Malware Config

Signatures

  • Renames multiple (4616) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b89a432e0cbcb7773a1d8f852beeb811760f6489cf1ceddd0834fcf811cd8252N.exe
    "C:\Users\Admin\AppData\Local\Temp\b89a432e0cbcb7773a1d8f852beeb811760f6489cf1ceddd0834fcf811cd8252N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3756129449-3121373848-4276368241-1000\desktop.ini.tmp

    Filesize

    69KB

    MD5

    0d8f6c0caa467505835cc6bb1430f1f1

    SHA1

    6995953c25c9ddd9970d00c20a10a14e7f5c3850

    SHA256

    fb11f44406640b80ce72f2c5b54031839819b02934b6bc10aaf422f04ca00da9

    SHA512

    31925d06ab9af7932d0de18408bd63a85ffca798a10b3dbc781fcdcf760bf8dd43da3dc298510f4207ead11caaac2ac26ee6bcbf4a8c2a431e8b31813ba7feb2

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    168KB

    MD5

    171286d7a57113c4baa63930d7e70db9

    SHA1

    f3d16f9c41e696193e6680a68cd2fda0e386e032

    SHA256

    2aca6d9be35ddb54b4f53c8a007fb3ee4f74df4b1059dae8aaf9e9289efa04da

    SHA512

    3847aa399a190b38257034ddce4864efe2ee4c8abb5fb033332483253b566f656910aab351eeada8bf5cefc7842178e5f376184dcb08e6770465bbfe5c06bea8

  • memory/3172-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3172-780-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB