Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/10/2024, 13:21

General

  • Target

    b4d21649d94346f6e02bd35bdd1acdfb36d233878700e4284e2daf0ccc95f168N.exe

  • Size

    67KB

  • MD5

    420e73253b010bbfd4a46517ced87100

  • SHA1

    2739180d7a28dfa7c6c3fc4fcace42f31f6ff77e

  • SHA256

    b4d21649d94346f6e02bd35bdd1acdfb36d233878700e4284e2daf0ccc95f168

  • SHA512

    42194901f336496cc402fce4a22b8945a70d061920a59d08995773753134f8d982051fa8c893cc64d2dc7a3e52eb0bf9871a69f04aed683403ee82f35a8edc6d

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcwBcCBcw/tio/tiJFEFuod6:V7Zf/FAxTWoJJ7TTQoQPyPhehyDbaDbr

Malware Config

Signatures

  • Renames multiple (4773) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4d21649d94346f6e02bd35bdd1acdfb36d233878700e4284e2daf0ccc95f168N.exe
    "C:\Users\Admin\AppData\Local\Temp\b4d21649d94346f6e02bd35bdd1acdfb36d233878700e4284e2daf0ccc95f168N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2045521122-590294423-3465680274-1000\desktop.ini.tmp

    Filesize

    68KB

    MD5

    5be5f1e0215f580ba559064dd11e7532

    SHA1

    1ff98cc2ba076e7f61bafb214d1ff7ddad219fe3

    SHA256

    214089136b1805b4e04cecfd4566f6ee0dfdae8e2fc795bc585591ae31998b53

    SHA512

    39f92a94b47e633635b8ddad3d8d9e93370ce457e8b7e074e7fc15465855de63ccaecc37cceeeac09343526097ecf44a980b16a4ed7e97eb6180e0cb46316683

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    166KB

    MD5

    5d26c6d73f48758db2e25e49165571ea

    SHA1

    08e6c9d801320e8e6af78b83a76d9a3f041f61a8

    SHA256

    c64e31e0af212e75a62da2f0a272634129b26308bc0926cfe346958ab0c4a87d

    SHA512

    8826d168a2072c96f7416fea98c985691c87dee4cbf3044e96414aa37fa1b5aea1c714b0b0f72ab047f40a1cde880e0f4658a4463f300fec8353592014eb3d22

  • memory/2692-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2692-660-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB