Analysis

  • max time kernel
    120s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-10-2024 03:18

General

  • Target

    a0cc74ffa4d469e099f5c620b7c2ae86d0fe188430e0c4b595a690eb3f3c1da1N.exe

  • Size

    54KB

  • MD5

    e32b33f0ed830a2bd58ec865b9a5f8e0

  • SHA1

    2d3ff04161198e646ac41de1b312c18f13a9e46a

  • SHA256

    a0cc74ffa4d469e099f5c620b7c2ae86d0fe188430e0c4b595a690eb3f3c1da1

  • SHA512

    6d46719b6256af6f5310734a51b855d1b1c54ee329c9d2994963cff7762eec1fbe1c231e589002dd191e56c4898d73a5faeadc1cdddc546e817b0c77496127ec

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI96o+QOViJfo+QOViJb:V7Zf/FAxTWoJJ7T2UA

Malware Config

Signatures

  • Renames multiple (4631) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a0cc74ffa4d469e099f5c620b7c2ae86d0fe188430e0c4b595a690eb3f3c1da1N.exe
    "C:\Users\Admin\AppData\Local\Temp\a0cc74ffa4d469e099f5c620b7c2ae86d0fe188430e0c4b595a690eb3f3c1da1N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4050598569-1597076380-177084960-1000\desktop.ini.tmp

    Filesize

    54KB

    MD5

    b9d87056180c4cd8b6480fe2a1c47a38

    SHA1

    b63fa5475fd772721d50c520c997ca49a16096a8

    SHA256

    f4f4947687d590d71da441a1d78df60be49988f50cb32c3eaee2ff357d592494

    SHA512

    849df16774271dc869db88d09ab2bf465795517c75057e84c83b7411fd88bfc713633d1c0c70b19cf27b2dbd3e8019f9dc5501028b76a4927fd356eec386c5c2

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    153KB

    MD5

    dc755d3da074f2281a6b23e419ae2b89

    SHA1

    61a0124fd9b2ef2179029b331df5a3b79d91c58e

    SHA256

    055f7565ddf4a5e122ce28e7b9573a88aaaeb1b7d121588fbe3d8cdab7460dab

    SHA512

    347e33423e789ff44083ed56a6c212b5ad597fb0676bc478ac56d09d0f3ade593e60d07e00cfc683f1dff677ddb7d8429bc1212e32b655ac86f602335411a11d

  • memory/2840-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2840-784-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB