Analysis

  • max time kernel
    71s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 07:02

General

  • Target

    be33194c4ee4586c536e9ab8d978021815eafdd36231dd4de1186bd3ec5bc85c.exe

  • Size

    60KB

  • MD5

    8277b65d3e0c37d1c5857776a7d8f2c6

  • SHA1

    0d4ef0603abfaf592a4bfc1385f3a5cb511ceea8

  • SHA256

    be33194c4ee4586c536e9ab8d978021815eafdd36231dd4de1186bd3ec5bc85c

  • SHA512

    9a006ee5d3ca1f534874cff906a6e45c147e4e062c52be40e628942f192cdae96dfff3a6c320cd5ed0338449c922aea197f056356f1b7b63d01515c50092a5fc

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATBHfBo8o3PV15Rn:V7Zf/FAxTWoJJZENTBHfiP3zemtjF

Malware Config

Signatures

  • Renames multiple (1813) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\be33194c4ee4586c536e9ab8d978021815eafdd36231dd4de1186bd3ec5bc85c.exe
    "C:\Users\Admin\AppData\Local\Temp\be33194c4ee4586c536e9ab8d978021815eafdd36231dd4de1186bd3ec5bc85c.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4050598569-1597076380-177084960-1000\desktop.ini.tmp

    Filesize

    60KB

    MD5

    ab224d09bc34d1a448d7fb955d199151

    SHA1

    b026e8bb5ce40e5b19ebd4eb9c2e3c69b05fd400

    SHA256

    1e035646b177274a36b44467f4c8ba97df8096b3441ad85d14071fe3018114db

    SHA512

    e736592424d1f68aa6828dac2ae93ffc3b701a10b9c7f6c144fcf8ab651cfd562723fd639b0c781d7373f9dd3af3509c5f38b5833cb5ec552267ea8f84fe09d3

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    159KB

    MD5

    bc4ca074da0ce171b863c11e8f805d05

    SHA1

    989e7a485512662d2bcff6b4270b94b42773d08c

    SHA256

    03ea94ef2985f1b9610d5904d11e99f4703901296797cf9647a6d58637e00193

    SHA512

    285658c9f7e29c53bd19f46509f9fa48ca530ce15b0c29e41d2b1573c4b883800283cfca4a4ca29d8bcfb2e5712f5c7989b1896d4222bb821dc1a1868a2037e7

  • memory/3004-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3004-654-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB