Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2024, 23:07

General

  • Target

    692e717964af95a25082411f8f0c70af06567418b0296b171ac4bb882e72b6cc.exe

  • Size

    50KB

  • MD5

    00999cef8a961a11e7beca4c94e67af0

  • SHA1

    fd65cd4c829b3418183ebbc2f77eb278f63c78fa

  • SHA256

    692e717964af95a25082411f8f0c70af06567418b0296b171ac4bb882e72b6cc

  • SHA512

    1131653990c6349bd92fc8defe362104cd9642381d32fbda23f7059d11f0c7e24758bdb58f5a4af8053c2efb84bbdd35b3b5f4b98f965fdf2e29cc04d665157f

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcwBcCBcw/tio/ti3c7Fc7u:CTW7JJ7TTQoQmou

Malware Config

Signatures

  • Renames multiple (5195) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\692e717964af95a25082411f8f0c70af06567418b0296b171ac4bb882e72b6cc.exe
    "C:\Users\Admin\AppData\Local\Temp\692e717964af95a25082411f8f0c70af06567418b0296b171ac4bb882e72b6cc.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4050598569-1597076380-177084960-1000\desktop.ini.tmp

    Filesize

    50KB

    MD5

    1dfb8c92e37495b5c9a694ba49ba5b0d

    SHA1

    7c6ee51706b22b48ff066629499abc615b6a689c

    SHA256

    a8fd0e9cc33ab9da53b0334034ec797b59213cc8e66111f55f16dac5d6ca265e

    SHA512

    65f1beb92db1f1787dc2e20d3b32336e2da8e11e2573a5e8c1d85a543a6f58cf354579c4684fa094eed948c18bfd5c3c405615f9832938783f72ebb76a9debf7

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    149KB

    MD5

    da86cbe3735aa40ade7670d53513a4df

    SHA1

    3259d1672268b7eac765d81552a7be664c1d1271

    SHA256

    51d338d53db8d99ba707e5ffd483b40430a606723effd2fbfa8700b2f30e84cd

    SHA512

    93983ff4ccc6bff68e69ed1414c1b285381c60620d05ecd5c3c24dae9c85bcb1fc4ca1ae52aae677bd0b186d54c03ad9b2eeb78fe3efe65f0a2a4f33ed401c1f

  • memory/4928-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4928-785-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB