Analysis

  • max time kernel
    120s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 03:58

General

  • Target

    f27b2a0616181a63c2b3c4737ce1c26ddaa47fb061d75c253d7249ab2961195c.exe

  • Size

    74KB

  • MD5

    5a65934456a2c51ceb777930e3a9560f

  • SHA1

    61a027500cb1da73f38d44223e79633bbb7b1eb3

  • SHA256

    f27b2a0616181a63c2b3c4737ce1c26ddaa47fb061d75c253d7249ab2961195c

  • SHA512

    f8f2a472dd3a40366b1d19349c79b1ef05840c0c174d23a73f4669f222225bafec4f7ae88761586251eea68a978021ce27bda3dc7054d89bac031c27f9c7fcc4

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATBHfBo8o3PV15Rp:V7Zf/FAxTWoJJZENTBHfiP3zem9

Malware Config

Signatures

  • Renames multiple (4110) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f27b2a0616181a63c2b3c4737ce1c26ddaa47fb061d75c253d7249ab2961195c.exe
    "C:\Users\Admin\AppData\Local\Temp\f27b2a0616181a63c2b3c4737ce1c26ddaa47fb061d75c253d7249ab2961195c.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3227495264-2217614367-4027411560-1000\desktop.ini.tmp

    Filesize

    75KB

    MD5

    b2e6ee96a6c7f4292919a1fc1d22b17d

    SHA1

    781e1d5713be9ebe49605cf06cb9869665c5d45f

    SHA256

    11ca8fad6670b1764a15ac35070cdef89c870e699613c1cf5ac5dd7692adaa59

    SHA512

    4051ee6912abe33822bc7bc3652a1c859819f917677be6dc052933ebada844f65da6e313d5ecbc8c1177a2eaa697e057b0c4c12ca8425c793dd5f415fdd75655

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    173KB

    MD5

    58176d4a7aee2c52a43ac0258dcf6a38

    SHA1

    04bea596dd07b58b7c95fd7684148866e802d6ad

    SHA256

    541bcd43a880225f54fce22b4c88b9d2e3c0d150c446e7644dddcdfd9e4c4943

    SHA512

    7d2876adb6df9f3d4ef87000c2a4526c300aa55a5ca59a965d324f7e2caa5c702e83e6ef99ec9bf04c1e2660672596bc9217735312bc29ac1fd754aecbfe1da2

  • memory/3552-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3552-660-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB