Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2024, 03:36

General

  • Target

    d40ca8ff9161ac3061cd758f9133314601b2f00678ed95bfbb83e44b6ad4a5ba.exe

  • Size

    42KB

  • MD5

    80ec5b9721dd8b976660378b319120f3

  • SHA1

    7a1a3e0eb920683d9c2179beffb8edcab710895b

  • SHA256

    d40ca8ff9161ac3061cd758f9133314601b2f00678ed95bfbb83e44b6ad4a5ba

  • SHA512

    646b2ac399a303b657dc228e196de8937b10e158d3ba043e3da252bf06c285d35f19fd01fa155a0c1ad71b5982ffeba910356af65f322887445ba42b089723c6

  • SSDEEP

    768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATBHfBo8o3PgEieBXEieBL:CTW7JJZENTBHfiPgPWXPWL

Malware Config

Signatures

  • Renames multiple (5237) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d40ca8ff9161ac3061cd758f9133314601b2f00678ed95bfbb83e44b6ad4a5ba.exe
    "C:\Users\Admin\AppData\Local\Temp\d40ca8ff9161ac3061cd758f9133314601b2f00678ed95bfbb83e44b6ad4a5ba.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3350944739-639801879-157714471-1000\desktop.ini.tmp

    Filesize

    43KB

    MD5

    67b7cf354bcc282fa1610ad7eb9a2a2c

    SHA1

    c9b8876f9bca9e30eda854c1c00446346b31fa8d

    SHA256

    1665334d52ff5f2a13a3dabcd44db141e1d1f2b63ab4a80c9aa59bb9c1ec1e03

    SHA512

    ef66efaabbbe842312e6e1ffa362372a8495f374e516baaed1e3a023f552362cd6bf0ff7a4f26b0589a485a8bec85c345a8789baf2311f781c77050fedf7a10b

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    141KB

    MD5

    26abc18fab0ba2accbd563e7e9d3d5a7

    SHA1

    b6ae69c650edf8280a60d1ccacc120e2fa4a77e0

    SHA256

    df6611dbcf9cd463dcf800159c45e08b1c3a00e5e176af8666e6b142201f0ad2

    SHA512

    843e6d51c30179ad3b2c06f505d95fe885758d4517de11b40fd0ff2f1b43d1bc63afc76aac82cf321a647361c711709769303f6a8e0b7d3a3f6f8f328bbf4b24

  • memory/3952-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3952-788-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB