Analysis

  • max time kernel
    149s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2024 06:56

General

  • Target

    2ea19290113f159463b5a50154419d4cc91a3bde3a1a525741f2f4b536048a46N.exe

  • Size

    45KB

  • MD5

    71d2c4f10b0c489037b636b34bb839e0

  • SHA1

    9050cec1f815b738cda6727b7ca657ad9a1010ba

  • SHA256

    2ea19290113f159463b5a50154419d4cc91a3bde3a1a525741f2f4b536048a46

  • SHA512

    27caa7f5e5744c834c931b37a918233e50547a8ff5d6a8ab0ff99636ded6928b6794a36e7883f78def47307ada9491b3001598e37fcf33c11b169d88b207bed4

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcwBcCBcw/tio/tiJFEFuodcOZiJSQOQiJfodcOf:CTW7JJ7TTQoQPyPhehd

Malware Config

Signatures

  • Renames multiple (5193) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ea19290113f159463b5a50154419d4cc91a3bde3a1a525741f2f4b536048a46N.exe
    "C:\Users\Admin\AppData\Local\Temp\2ea19290113f159463b5a50154419d4cc91a3bde3a1a525741f2f4b536048a46N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3276

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4089630652-1596403869-279772308-1000\desktop.ini.tmp

    Filesize

    45KB

    MD5

    1cd2f7ddb47339c8715d97fe737ad615

    SHA1

    240b5462eb0e5b5f2f819ed0b15dbf6aa597edcc

    SHA256

    b9d4e764ac9dc8b96b82ef415ebaa5e0cbf3668ad291f51207809347d3011913

    SHA512

    b3890e0d643c1531f10e583081b360f6fa2c19463c012cd4fa4180b433d03390c1e4116b925dbfa769d00942b3c26d27ba8f723b4fef80537c18fc2c09d7b0ab

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    144KB

    MD5

    250749ae867774773641af311806ddec

    SHA1

    e68d2ecf532961de9fd7f36490f966edd1aa6f1b

    SHA256

    50df32c3dc54fc6b6b4620c2b771d4866b9c4e28bdab3c0e86b47548749a8b32

    SHA512

    7f65006d3eb69777f21f362d39d237fa98c062d7ff57c554b67eecd15e79ff22c850ce8f13ab1321db5c6dd1bce95f7b984f2e96270b1f39129b926537484ace

  • memory/3276-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3276-789-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB