Analysis

  • max time kernel
    120s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 16:01

General

  • Target

    b25c746c98360331373da9fb9fc830be1a037ba2f6cdccb7b1296ee20e38a6a4.exe

  • Size

    157KB

  • MD5

    ce4f2da869e454586dd14313e94ff94d

  • SHA1

    497c88e233c8a4f64e388ebf9005c12885773e4d

  • SHA256

    b25c746c98360331373da9fb9fc830be1a037ba2f6cdccb7b1296ee20e38a6a4

  • SHA512

    f06a79124a0e68e9774a1416482e50b90694dc442c2f71733dd73c471b80a448f6729806fde30b66b8c0f840a4c1d27314200706d4b95397a0bfa6b76fd5cdf1

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTBHfiP3zgn94pWHlPEXZzjUq3th5f6utM5vLNinVmWvMu0bV:fny1tExnQWHIjN3tj6qnv0b2UrXkbvLW

Malware Config

Signatures

  • Renames multiple (2533) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b25c746c98360331373da9fb9fc830be1a037ba2f6cdccb7b1296ee20e38a6a4.exe
    "C:\Users\Admin\AppData\Local\Temp\b25c746c98360331373da9fb9fc830be1a037ba2f6cdccb7b1296ee20e38a6a4.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3227495264-2217614367-4027411560-1000\desktop.ini.tmp

    Filesize

    157KB

    MD5

    b8a316f1faeafd60efce5f58fbe2c4a9

    SHA1

    39075781f41ae97cf0fa09848a4250955efe5fa1

    SHA256

    f10b61c11ab8d30ea1a27cc833489b6e2a3bee7b4003d14afc74fd4ffc36f96d

    SHA512

    df213cc5da2a56a47672d735358e52761feeda343b64f3c2fb1317e09db9059e4d86135c9d6b95a3dae5826ea88ee9cf7b211d2f5972ac46cf82d8e53de2e4b1

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    256KB

    MD5

    9a03697277de5df7fd8a457e94f6bd0c

    SHA1

    5b188afe7cd845487dba2943abaa8d328eee2708

    SHA256

    0d179110494cc32874ab7572e14dcfa3713483e20bf0cee2db64120347c030a8

    SHA512

    d98db222f446408bd10e4fd997f3d02ea7436815c600a9668d0d85bc15279d25094018d20e9da074275712edf4ade41ad5a23106693c28899b7bf303a35ec739

  • memory/4464-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4464-526-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB