Analysis

  • max time kernel
    120s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2024, 01:14

General

  • Target

    0914ca0d5143c30c4652e0652d6f5895d40c73f0ad737f343488fd781193f443N.exe

  • Size

    28KB

  • MD5

    613c81c71fd50e68499914a70b2ea750

  • SHA1

    9c0d072140fa81cfedcc4c0fcb5ae6e29d6fb290

  • SHA256

    0914ca0d5143c30c4652e0652d6f5895d40c73f0ad737f343488fd781193f443

  • SHA512

    d69f12d3647a5f1566b9b3f304f629c9ee63c8895b92c5f15e8cea364004cb51b58af42ad840dd3d73f576a5bf354a6fb08e85c5446211f567eb0cbfd5357be2

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJ1Evd5BvhzaM9mSIEvd5BvhzaM9mSsxmMxm9+9d9lqlt:kBT37CPKKdJJ1EXBwzEXBwdcMcI9dM

Malware Config

Signatures

  • Renames multiple (4637) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0914ca0d5143c30c4652e0652d6f5895d40c73f0ad737f343488fd781193f443N.exe
    "C:\Users\Admin\AppData\Local\Temp\0914ca0d5143c30c4652e0652d6f5895d40c73f0ad737f343488fd781193f443N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2878641211-696417878-3864914810-1000\desktop.ini.tmp

    Filesize

    28KB

    MD5

    04dce68f3159b3d627d8a23a9abcd5ab

    SHA1

    9db567c90ff27ebd9dd299f6428c6e8b2ab36f93

    SHA256

    e6830b48456ec9dae172c303f4511df5d30e2603e987b0e40337f97da972cfac

    SHA512

    87196cd4e71e6f1472368d8a9bddb28635d1b3bab2e570f587a02e1dc05923e5e81b45d8c1c1f4cee6962ea5ad661db8abcca6470a4d40060f1c2a0d76a8a6a7

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    127KB

    MD5

    83047d91d25936fb2302474e5369168d

    SHA1

    55c07871e024e67276890b453f46da0e9937b801

    SHA256

    f1276ded8a2fa32ca2b91eb0b71a8292e25c831c6cc214b6f2a5b0b633e11107

    SHA512

    19cf6f482e21831c19700f84b28623d445bb5aebba970a909001778edd23f5062cfe5f2be556097c4868ecb49c7f3ed2a3c81e0b3a35a7242574c69ac243888f

  • memory/3940-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3940-779-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB