Analysis

  • max time kernel
    150s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2024, 22:14

General

  • Target

    5d083ec593e6f92af9f26de5667846644baa83954baca58ed9b202f442b1a89a.exe

  • Size

    56KB

  • MD5

    75fab4d14008a47533525f18e38403ed

  • SHA1

    7c371297285c87da42d70894c4a9decf08a08038

  • SHA256

    5d083ec593e6f92af9f26de5667846644baa83954baca58ed9b202f442b1a89a

  • SHA512

    78004f65c9a871ed4d2ea80c40347c569cbb0548407a07ecf66bd2b8cded91b05c4851adf984ee9c3f05ef0ce6c2d8d779b45bd04199e6401473bec56c926d21

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcwBcCBcw/tio/ti3c7Fc7xCtC4:CTW7JJ7TTQoQmoxCtC4

Malware Config

Signatures

  • Renames multiple (5030) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5d083ec593e6f92af9f26de5667846644baa83954baca58ed9b202f442b1a89a.exe
    "C:\Users\Admin\AppData\Local\Temp\5d083ec593e6f92af9f26de5667846644baa83954baca58ed9b202f442b1a89a.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4632

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3756129449-3121373848-4276368241-1000\desktop.ini.tmp

          Filesize

          56KB

          MD5

          cb9b0061e5decf79d153d8d88267d58b

          SHA1

          28191c2dbb41788f6cf34d270907cb4c878b09b1

          SHA256

          8294dca8b4adc669476a693ecfcf8c7199dba6d516c9aa9fd9f6f78100739e12

          SHA512

          ff98244b83bf142a3fb6c02012977bb328668fb0add21cf60921905bae8bb74eff7e91aad65d4daba764d6bb1b22d6e1b2c8d5215c38914706c03c9669e205ef

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          155KB

          MD5

          8e943a2523fe1ec3af77a5d7a3ca44f1

          SHA1

          90cc6ef6186a8e8e1ebe06ab3032615f9754aaa5

          SHA256

          224a32635dfc9680e3f67016735c45bc87359656824b6c3d5a35fe16a1f823c1

          SHA512

          93d3f227781414d9a501c9d019530aa2f32020f89ba0fc1af884d8707284924e2a9308d4402ec8f9c852e6414c3202b88dc6d5e8479391995e218fa42aa10e0f

        • memory/4632-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/4632-717-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB