Analysis

  • max time kernel
    120s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 19:22

General

  • Target

    5894f5a046be818145b2d107b71609a0fe6726e1ebabebc44d645d88caac90da.exe

  • Size

    146KB

  • MD5

    c463642173cfd448636657c21e40859b

  • SHA1

    12e80bd51050a62847cb2857804fee992c470505

  • SHA256

    5894f5a046be818145b2d107b71609a0fe6726e1ebabebc44d645d88caac90da

  • SHA512

    2447e603925bc32728b7b8381296d90b8a97046642900a6e80ffe756a989db14e6940fa17272294fa609959c062682c9bb81ca36e327c38cebc61600d19b4784

  • SSDEEP

    3072:fny1tES0Sm3Ka9iMGfUSaOy9SnJUwFU+FUhFUeFUXFUqyqKRrpF6Pwb:KbEJSm3b9iMGsSaOyie

Malware Config

Signatures

  • Renames multiple (2985) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5894f5a046be818145b2d107b71609a0fe6726e1ebabebc44d645d88caac90da.exe
    "C:\Users\Admin\AppData\Local\Temp\5894f5a046be818145b2d107b71609a0fe6726e1ebabebc44d645d88caac90da.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3350944739-639801879-157714471-1000\desktop.ini.tmp

    Filesize

    146KB

    MD5

    c488101617e797f40d8382d2153732df

    SHA1

    586693025e4d398e65da234d81c4494be831ea49

    SHA256

    8e8bcf5203976ce15d34f22cac78a4c54dad4c214e16e364ec4b686f1d6bae6d

    SHA512

    13d332f3d0659fdc733f400aef2d546f4071dde7dcbcdf333893adf5a321a2132bae612368e9e82bacbeaa018f3779ad124569e18d8582fd53ddb86800cfe533

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    245KB

    MD5

    78e01c3e9b7ddd4fa9da8e95325325eb

    SHA1

    1b90aa38992a1e06a78a75cf66ca4d6964dd50f1

    SHA256

    c26a501ba5b2a09bad2f83a525779968e19f24d7f3689de634ed7bb99ba5c357

    SHA512

    df99c5314dc4a595fb5aebca34ec9977fdc943d9cbdef61daf697330a965f087400568cd4bb67989cd984cecb6da2af66ab745bd5ee769af23dbf02a2290b501

  • memory/2032-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2032-638-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB