Analysis

  • max time kernel
    119s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2024, 06:51

General

  • Target

    2ea19290113f159463b5a50154419d4cc91a3bde3a1a525741f2f4b536048a46N.exe

  • Size

    45KB

  • MD5

    71d2c4f10b0c489037b636b34bb839e0

  • SHA1

    9050cec1f815b738cda6727b7ca657ad9a1010ba

  • SHA256

    2ea19290113f159463b5a50154419d4cc91a3bde3a1a525741f2f4b536048a46

  • SHA512

    27caa7f5e5744c834c931b37a918233e50547a8ff5d6a8ab0ff99636ded6928b6794a36e7883f78def47307ada9491b3001598e37fcf33c11b169d88b207bed4

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcwBcCBcw/tio/tiJFEFuodcOZiJSQOQiJfodcOf:CTW7JJ7TTQoQPyPhehd

Malware Config

Signatures

  • Renames multiple (4681) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ea19290113f159463b5a50154419d4cc91a3bde3a1a525741f2f4b536048a46N.exe
    "C:\Users\Admin\AppData\Local\Temp\2ea19290113f159463b5a50154419d4cc91a3bde3a1a525741f2f4b536048a46N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2437139445-1151884604-3026847218-1000\desktop.ini.tmp

    Filesize

    45KB

    MD5

    3cc920451397b8b45dd682b20db49fb4

    SHA1

    fca947b1ec185c3fc2438b7f107a591ff95f834a

    SHA256

    fc722fd852ee248b2bd5985594930594c2cf93259071b8c7e5a8278dbfee3480

    SHA512

    f857f1b0dc08146006a0455c2a15c734d6fb6f66d0d1707e47c66e05400a321d5523dbe807e49e4af55d14b5cf1d83fd5bd9160e197e1a2b1d74698d35147a4b

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    144KB

    MD5

    73ffa482c315145e2362c2818cc69ab7

    SHA1

    6e743481458d255a8a083ef77122add60cb0984e

    SHA256

    46cd6fdb7b3020dca1833abef9f725d5ca218c809a0a5039aa2bec92ca6dbf3d

    SHA512

    791715cad80d5207f99366572f78addfb1b958332bab10b69f87d14a7ba5b8163cf8124b51f0d2f454c58e4d2d323cf5c72b40046b5c454fae1bebe368eecb0a

  • memory/1652-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1652-789-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB