Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/10/2024, 23:54

General

  • Target

    0247fa6388c52c0e47069cf783b26d7cd7ebfc065bdf2ea67756a2504165c87dN.exe

  • Size

    59KB

  • MD5

    c9864bb06427f491583bf6d2e79a5990

  • SHA1

    0fcf72a4331b8a8ce81bd1ba83d34a8511259259

  • SHA256

    0247fa6388c52c0e47069cf783b26d7cd7ebfc065bdf2ea67756a2504165c87d

  • SHA512

    84579c257e60d62340f6261a995fe8a784575d351736ce8e09b0ec53df72fe52458925b2d28821923b35e68f0e230dab53ffdece6150a60b3f8c57ff685e8e81

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9Y40g40m:V7Zf/FAxTWoJJ7T2LgLm

Malware Config

Signatures

  • Renames multiple (5190) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0247fa6388c52c0e47069cf783b26d7cd7ebfc065bdf2ea67756a2504165c87dN.exe
    "C:\Users\Admin\AppData\Local\Temp\0247fa6388c52c0e47069cf783b26d7cd7ebfc065bdf2ea67756a2504165c87dN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2324

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3442511616-637977696-3186306149-1000\desktop.ini.tmp

          Filesize

          59KB

          MD5

          753b5c0e90c723c482e7ed9ea14c012b

          SHA1

          cec73d68b947b14f11aac84009112368e36e99ae

          SHA256

          c65e1d95760282dedd9194eadb7258704a88b7c7714c96823c15a9037488a307

          SHA512

          84feecaed5793d54add8bffe76fa8c47b1f2558a601bd271ca078e9800e143297fcae861180969bf52f97ae8dc31f91c0d35991bdd19c418adb182b0d50a0ad1

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          158KB

          MD5

          f6aaaca1960f7d511b15c3be5035fc84

          SHA1

          e7d89bf5801748d4cef24f7461fa6c9462778b4c

          SHA256

          634b3a88214d3d690c172f57fc9420e1bdf023f63be7fba9e3ddfb825154f3bb

          SHA512

          ee5ddf5bda16abe01274678d19aafa2fd949132dfe3ad43a5f7e82147541639c137400315d47c1f1041b8dd66b8c96691bf3533a316e6aaee759cc4d0ee30e09

        • memory/2324-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2324-726-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB