Analysis

  • max time kernel
    119s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/10/2024, 05:55

General

  • Target

    01d35cfe8fcfab0836ac0ca7ce34c76fbb773bdce1085dd2fa6930334923f400N.exe

  • Size

    39KB

  • MD5

    0ebf7a67f138327704f858f831c91b00

  • SHA1

    d0fe5df8b28264c2e8c58a6ee0c5967b813cbdbd

  • SHA256

    01d35cfe8fcfab0836ac0ca7ce34c76fbb773bdce1085dd2fa6930334923f400

  • SHA512

    c3baf0907a5bbf6d47ee3328da3fa2ea781c9db39fd5be5d16c6fe336130d7f870ded23708bd14ccbf70241880efead297d612f8ba366bf5b3feb5338d05b425

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9Ro+QOViJfo+QOViJEopodSox/6Sox/9u:CTW7JJ7TPUTEy

Malware Config

Signatures

  • Renames multiple (4658) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\01d35cfe8fcfab0836ac0ca7ce34c76fbb773bdce1085dd2fa6930334923f400N.exe
    "C:\Users\Admin\AppData\Local\Temp\01d35cfe8fcfab0836ac0ca7ce34c76fbb773bdce1085dd2fa6930334923f400N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4396

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4050598569-1597076380-177084960-1000\desktop.ini.tmp

    Filesize

    40KB

    MD5

    0a7e475da6a18b021616f64a974ba9f2

    SHA1

    2483545c43fd0b71177903f2feeb889735712940

    SHA256

    23bcf596be999bd3ccc74d4c7dc6e698e36634f9a571721215d33c0560b2c349

    SHA512

    ab1d7e13b9441f1086ce742e81e4d150e7d1b42274b02a4de97cb469260d36458a21f6d500a94820c252c6ca5f37d508ed79d869477309b45db2b0aef4a44f13

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    138KB

    MD5

    b3a9009d61a8751c404a653cbc433a78

    SHA1

    9597c87ba7c0cda5fc25bf2b8e7f113b8a73337d

    SHA256

    0d20cd0c55fa0d6e3d2c3154210712de7f08ecaa1082789478276563904fc0f6

    SHA512

    eff430438ca6dd000ce038b755ceefac5851c1cca2632ae22f0014304d37981d9588fc9acbb8ec1215999ed5a9e219b39c6c9b64faded70cfc3e7944be112dd2

  • memory/4396-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4396-790-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB