Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/10/2024, 06:50

General

  • Target

    315d4009889fd0e5ebb4ff6d2aff4666a07c26590cadcb7c924b97e200834b0eN.exe

  • Size

    82KB

  • MD5

    9baa7a98d217516975fbf328e88ad890

  • SHA1

    c54a7ae65f817f649581b30a617e5fdaf6c8fba2

  • SHA256

    315d4009889fd0e5ebb4ff6d2aff4666a07c26590cadcb7c924b97e200834b0e

  • SHA512

    d4611e87e8aed384c23b63f82e6bb9bdb9cf0954e0d1a861d6d45910f77353c620a90666acbc7880f1b29cd5096d565af6e40edea984254808e878e21ec465e6

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9jBT37CPKKdJJ1EXBwzEu:V7Zf/FAxTWoJJ7TjTW7JJ7TGHs

Malware Config

Signatures

  • Renames multiple (4841) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\315d4009889fd0e5ebb4ff6d2aff4666a07c26590cadcb7c924b97e200834b0eN.exe
    "C:\Users\Admin\AppData\Local\Temp\315d4009889fd0e5ebb4ff6d2aff4666a07c26590cadcb7c924b97e200834b0eN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2045521122-590294423-3465680274-1000\desktop.ini.tmp

    Filesize

    82KB

    MD5

    12d0f19f716638b8d84750acc3dbedd8

    SHA1

    04bc1275ed772c50053cef25531208e9303a62cf

    SHA256

    92dcc21fb97a70bfb18a55292571e7248989e57e7c1b530a08ce97fc1b521d24

    SHA512

    f70e2ac4f73bd0f15253b15c052a852e5c4f1bf7c1dccca0ac9122ba52c10d23d1157604916e35405e91cb3e88d7470c8d942045318771f713cefe8e2c77ce08

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    181KB

    MD5

    dfb5c69b6fb911c0c1619be14e734aa4

    SHA1

    c4d3ff88e89fe62f810fff8bc71cbcf626395a35

    SHA256

    aa5c722d7f71cd05a8d9b53940634a4a7fece496280327fe5511946b846ffa61

    SHA512

    a248d2a8f160d5ab19a1fc48e41577af0c3019d139e4a3b45ddfe1a20d58ba8c5027794d99fcf6ddc17d626cbaabf386d3a69c8d195d7b0acca92651e102eb0d

  • memory/2764-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2764-656-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB