Analysis

  • max time kernel
    120s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-10-2024 00:59

General

  • Target

    64056715feec20245d8c4da077a277a3424f1249489af2b6fe8de039de8a0ea4N.exe

  • Size

    79KB

  • MD5

    67fab0b8e95c103f478abb8ce5109120

  • SHA1

    94042fe759dfb908c180b9f38af9cd4fc5d09526

  • SHA256

    64056715feec20245d8c4da077a277a3424f1249489af2b6fe8de039de8a0ea4

  • SHA512

    4385e5869e5e1e7b44929d2ad31aaec255f840ae742e4cc544e2315846ef46466b6602e0bb1af06ccbeb3ae8891bca6ab8b2a1af5d23e50893f85078a8c6faac

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcwBcCBcw/tio/ti3c7Fc7I:V7Zf/FAxTWoJJ7TTQoQmoI

Malware Config

Signatures

  • Renames multiple (4637) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\64056715feec20245d8c4da077a277a3424f1249489af2b6fe8de039de8a0ea4N.exe
    "C:\Users\Admin\AppData\Local\Temp\64056715feec20245d8c4da077a277a3424f1249489af2b6fe8de039de8a0ea4N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2476

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4050598569-1597076380-177084960-1000\desktop.ini.tmp

    Filesize

    79KB

    MD5

    073178812a40081415cee2cf20758f8d

    SHA1

    b8cc9683ec0d94909d20ea81402de9b4ae5ff481

    SHA256

    40ca9c41d48c8f738c20bcf9ed1186e6c619582d0ea1836658ede6dc65a50c1c

    SHA512

    20bb13c7258b7312460c605933570d328be513bb73265d370fd207bd77bd6b78621d7842151df4797575f1d0ea81d8631dcc31ca2d3dcc89cb39b546353d7200

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    178KB

    MD5

    dfca45d33ee878ad4c03f068ea55ab03

    SHA1

    c5b93e96866f9528b44a55ddbb6bcc55dd9336dd

    SHA256

    74bac3d3ede362b8c9c4094d9a41ee9168e22513c36e3825dcb0f0bd42cd9b98

    SHA512

    1ed34dce3ac9073a9a31b5541064145cc8b5bf4e1994ab098b474e2cb9a7faecce3a6eea755409a98c70fc4ea9625c838ffae366424f88e330c95a5f81a1a07b

  • memory/2476-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2476-730-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB