Analysis

  • max time kernel
    150s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2024, 11:47

General

  • Target

    a48fbf495dcd3a19db531e91044b9388e8af57c6c2924165bd3a8976c7486e59N.exe

  • Size

    456KB

  • MD5

    32ab7a43a3cf837491cf18665f5d85e0

  • SHA1

    c4fe994e088ed5f5b6d17ab81410636027da28cc

  • SHA256

    a48fbf495dcd3a19db531e91044b9388e8af57c6c2924165bd3a8976c7486e59

  • SHA512

    481e81a302db035a4355b5495bd0173d8187a2d3ac60977fe54f9d28ae3ee3bb071ab0ab74b7b2222fe3102b6725d5ac74d4517d9bc0b86f7ef779975bf64613

  • SSDEEP

    6144:KiQSo6iaNSCKSkl3U73P/c00ROzq0U/glP10pIut+Wg:VQthH6RGAepIuJg

Malware Config

Signatures

  • Renames multiple (3954) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a48fbf495dcd3a19db531e91044b9388e8af57c6c2924165bd3a8976c7486e59N.exe
    "C:\Users\Admin\AppData\Local\Temp\a48fbf495dcd3a19db531e91044b9388e8af57c6c2924165bd3a8976c7486e59N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2388

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4089630652-1596403869-279772308-1000\desktop.ini.tmp

    Filesize

    456KB

    MD5

    603e5ab0a75a9697b2e5ed9dd059eace

    SHA1

    7a73031bed979fa388050e9ff7d7f14cc9a564e3

    SHA256

    7a03226a791e621bdc1223618d9526fb0df2496ea48a4b6e80984338f450e7c3

    SHA512

    505f6199d72809316cb6cc192539c50f0a0ac3018e70bb1641a8e2ff1ebecd4625880461db510f833e8d825d72ea71bfb9cfc19b05fa6f24ecf1f8370e019913

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    555KB

    MD5

    1310a8aab3acf235f79053c9559832a2

    SHA1

    a6084f439827aa80e8077c0e958694f56330935b

    SHA256

    f0c38f42f44cacbfa4e87fd4ec2874931e76f2636b17226e4aebf8d80884ba72

    SHA512

    d5571c7e09eef2d461eeba931e2563533923cce623167950365196ee3d15ec85631f4ed45ed2586279d83de7bf3798f7da147d13b1750316ffdb0fdfd03f16c2

  • memory/2388-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2388-516-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB