Analysis

  • max time kernel
    120s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 15:46

General

  • Target

    70e7a7e999be9b075056a050c2eeabe6ef462a03dc244cdddc0f1ba93f558262N.exe

  • Size

    34KB

  • MD5

    a003c662dcc8b19b255decbe58820430

  • SHA1

    3bbc86f37b515ebc2d93917214e5e4a80746dabd

  • SHA256

    70e7a7e999be9b075056a050c2eeabe6ef462a03dc244cdddc0f1ba93f558262

  • SHA512

    4e4ced0a8a3d00235229f9e344e6815c820fb401357adbf200df3809599a347aad11f516f601b01c51a91809c5dcdd672d3d1457acb0f7f9ec9418abd54455f3

  • SSDEEP

    768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATBHfBo8o3PV15R5N:CTW7JJZENTBHfiP3zT

Malware Config

Signatures

  • Renames multiple (4180) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\70e7a7e999be9b075056a050c2eeabe6ef462a03dc244cdddc0f1ba93f558262N.exe
    "C:\Users\Admin\AppData\Local\Temp\70e7a7e999be9b075056a050c2eeabe6ef462a03dc244cdddc0f1ba93f558262N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4980

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1045960512-3948844814-3059691613-1000\desktop.ini.tmp

    Filesize

    35KB

    MD5

    260f4caf112ed08a36d65219a5e78326

    SHA1

    ee0060e544fee0d17ec46b03584354d41edcb208

    SHA256

    1159efc26fbd216634150679bb61db22a506741568467e71ae66d37ee37bed86

    SHA512

    d2417e8055f9fb8da1d50f4898581500d9cca3e2a21e36625ca361cb9247ef11775f2fb1db6d7c54f0feb60c1e2b8b8e26e603cc7d1e777795873468a9f045fc

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    133KB

    MD5

    5d6a328bb36e5af859be81930e10b422

    SHA1

    16981e636247de978be9f0f70ef96256e6bc14b4

    SHA256

    dfca8133394e137c501272c730cb57e7849078befebbefb84bb60c8f90884416

    SHA512

    d9ec9077fc06d85d65fa43a4f4cd6a1a1a5a91df9ad714a317a1ae4f9a47edda65bca2b52843cf246dcd2eef99ba909c720aaa500d36948e932f55049e23c091

  • memory/4980-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4980-649-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB