Analysis

  • max time kernel
    120s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2024, 20:49

General

  • Target

    5ce87ba3b3082e563ee57977ea9f409e4c133df73a6d0c98085648d21f4d935bN.exe

  • Size

    107KB

  • MD5

    e0e9174c990ad720138638582e4b4340

  • SHA1

    0fd69549533089223c873de38c4f6377a23d8a5c

  • SHA256

    5ce87ba3b3082e563ee57977ea9f409e4c133df73a6d0c98085648d21f4d935b

  • SHA512

    d53a80b9367f9c01307110f391af589f35fe5d033449f66d18d3dbc9fbf9f296b00c1b1ae402f5ba034474bd1c808145f95c5b00ccbbf358c6f8ae42abba36f6

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTNyoKIKMQTW7JJZENTNyoKIKMIjUvpbN:fny1tE5KIKEtE5KIK7jUvpbN

Malware Config

Signatures

  • Renames multiple (4300) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ce87ba3b3082e563ee57977ea9f409e4c133df73a6d0c98085648d21f4d935bN.exe
    "C:\Users\Admin\AppData\Local\Temp\5ce87ba3b3082e563ee57977ea9f409e4c133df73a6d0c98085648d21f4d935bN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:972

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3756129449-3121373848-4276368241-1000\desktop.ini.tmp

          Filesize

          107KB

          MD5

          0102c123eeb2542a29812e2f8b00057f

          SHA1

          b8c4b32da5a2997799b1c3f2e1cba40710ac61b6

          SHA256

          d76d9db28b6e3fec1519512a8ce16249022842fb57b977c16f8c76651cc0ddee

          SHA512

          38234540610d521b074fa8c472cd43e57e7bc521121b9b0607db8a33924f180b2791a5463dca302e96a4546bccae4c5a2b1a49f0cbda7f9ac38e042b9a8b19fe

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          206KB

          MD5

          255ecdc83e5bc6ed81d8a284807c175d

          SHA1

          c8216e26641a5c57b68dcb6f36f866bfe302c8f1

          SHA256

          847cbeb015ab8cffb4af25dcf92ff01e76348ec736a4b7d0a556a42ba37a369f

          SHA512

          fbb9c89197ca47d3a083b5cd023aa1a1d62f82a9dd4140f4f3b51ba25b21cecd0493b35e9fe112413bd946824253bfe774384d802efb49321937562372f104e9

        • memory/972-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/972-660-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB