Analysis

  • max time kernel
    120s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-10-2024 19:49

General

  • Target

    aac4e35d44e30c20514ed1172e00b0aad8294297f64c4b4a3c8f02f970ecc999N.exe

  • Size

    90KB

  • MD5

    d1d65ef7cae0b959030d5b9ea4935d20

  • SHA1

    a583596433f1cd4564f5bde48746400ba96e304d

  • SHA256

    aac4e35d44e30c20514ed1172e00b0aad8294297f64c4b4a3c8f02f970ecc999

  • SHA512

    f426eb9a9971e2b1178c6371fd71494e511ed764d6945b703698e65d629a890395f49594b8f8f9248566eb09938569b0375dfc5b0a9183e297d7b960d4dabe02

  • SSDEEP

    1536:a7ZyqaFAlsr1++PJHJXFAIuZAIuXsJtLJt2:enaym3AIuZAIuX5

Malware Config

Signatures

  • Renames multiple (4211) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\aac4e35d44e30c20514ed1172e00b0aad8294297f64c4b4a3c8f02f970ecc999N.exe
    "C:\Users\Admin\AppData\Local\Temp\aac4e35d44e30c20514ed1172e00b0aad8294297f64c4b4a3c8f02f970ecc999N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2045521122-590294423-3465680274-1000\desktop.ini.tmp

    Filesize

    90KB

    MD5

    124c4369f18068f457d8a8f598f017e8

    SHA1

    9181a3b9425ff5a9ef689d9436fe6f66b98ef2f1

    SHA256

    23334b94508e2775117032c4f11c6417e22926219b7eca6e584e3438ecf05827

    SHA512

    4cf8501c7f10fa57209befb54b5675fd3480fc0c23f0097a4493ee2a3b3d9dc72a9bd6a5dfd50d44d78c006f16921d42d9a615ae2b276d238af379073ff4d412

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    189KB

    MD5

    57342d4587d309b6ece626384dd30add

    SHA1

    b89eae434597b1bdb3d865d7106cd63fa9fcaa7b

    SHA256

    2e607debfd514b29055562ff45ccc49d0190262440c8dcfc4d4bf86230fb98f3

    SHA512

    8a1d425a6e2975d104fdc2528103cdd91a96810ce03dadc713699adb1df95dbfe2bbec7812630d3d069b14e6e3f59519bf103eefc76f24b17803a7676fb021e3

  • memory/2952-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2952-660-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB