Analysis

  • max time kernel
    120s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 03:15

General

  • Target

    3532e1cb039401a531caa887415a747d28ec3d779bc65b5525a643b3158fab48N.exe

  • Size

    43KB

  • MD5

    028d6a164ce0f502b327e34b22431cf0

  • SHA1

    4185bf1931498ecedb88f478d213c4f2a95a402e

  • SHA256

    3532e1cb039401a531caa887415a747d28ec3d779bc65b5525a643b3158fab48

  • SHA512

    3ab6652f55c379d7bf8eb153ea9f6137f93747104a6c66403b46140c800a8bdd660523d8942aec0f6c70a0bd17260c877b2e96934914bb1c13277a3efe98d455

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATBf:V7Zf/FAxTWoJJZENTBf

Malware Config

Signatures

  • Renames multiple (4209) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3532e1cb039401a531caa887415a747d28ec3d779bc65b5525a643b3158fab48N.exe
    "C:\Users\Admin\AppData\Local\Temp\3532e1cb039401a531caa887415a747d28ec3d779bc65b5525a643b3158fab48N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940901362-3608833189-1915618603-1000\desktop.ini.tmp

    Filesize

    43KB

    MD5

    d39ccfef0ea4b67f9a0416de0eef9183

    SHA1

    a60812cb422072215f4a5d84488eac662f44c280

    SHA256

    5ed50ea008c23092ede7f0cafee603c885577d7f53f8739d84cec9597771ef20

    SHA512

    4f42964d765922cb93bd0c53d5310acaabec702fce9a5eff387a77d297543ad0fd563795e049c9a6be467728d18912ed9e23677cae11dc6f11567fe1a1203aac

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    142KB

    MD5

    75151224a8afc50030fc6d6b38abd064

    SHA1

    118c7c06e61d854fca53e1b2a3262a1f09357403

    SHA256

    e587e525cb383f0cb13d0166fbeb5056f56e83a7aed60d32cee0ec754d7ca6ed

    SHA512

    72c7632d1719d66b1f317c6dbf5f988d5ceae29bf33e8f08d183c6f985f8eb089915897669e64f2d245ed0d10fb7382c9e89adc400b046c2392317602ef24600

  • memory/1768-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1768-652-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB