Analysis

  • max time kernel
    120s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 08:15

General

  • Target

    0bacc2578103ce05f697eba4ba9d168924ac80172cf0bd2ff36d91f834f36fc1N.exe

  • Size

    101KB

  • MD5

    74a835c12cfe49dff9b0c227a07636b0

  • SHA1

    7d4389b48dde48f039ee715c2f1c69690d4208c2

  • SHA256

    0bacc2578103ce05f697eba4ba9d168924ac80172cf0bd2ff36d91f834f36fc1

  • SHA512

    68e1d709109ee646e9ef8db0c85fd7817d4dd0634fa72df74bb781d43fd420366950e2ba4541fcf00f0518849921707bde56271b719e81aeff9fdd44ff8f6de8

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTBHfiPRdgTW7JJZENTBHfiPRd2:fny1tEwtEt

Malware Config

Signatures

  • Renames multiple (4145) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0bacc2578103ce05f697eba4ba9d168924ac80172cf0bd2ff36d91f834f36fc1N.exe
    "C:\Users\Admin\AppData\Local\Temp\0bacc2578103ce05f697eba4ba9d168924ac80172cf0bd2ff36d91f834f36fc1N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:5004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1045960512-3948844814-3059691613-1000\desktop.ini.tmp

    Filesize

    102KB

    MD5

    e53e5febe0e3810329c6c75eb91a19ee

    SHA1

    a1a0d2d85b7581980be8b4ee9bd27c28e2d598d7

    SHA256

    c664f58ffb044e687d5e1009b855d95caa7f7254d037666443ee2ebc804f5abf

    SHA512

    2aa350bde6bff19d65cf8aac0a3238e73753d2b4539836126e5084fd013e82a1acffba84e45c76bcd6110e0146569e73b82a2e5c3cc72b4908072aa821363838

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    200KB

    MD5

    07f7f61685da9d1a820d857f288409fd

    SHA1

    b755cf61c69c1076401d3ad11a8984f1a0a6a4cf

    SHA256

    4d427859e17b6807214343ed05adc825526930cded71c94b88c48e560dccabb4

    SHA512

    d808857fc443d57c2436369a5d6040bc2fbef2ce3f200637fcab2ad96905128fe99fcf47e132212dbdf689c96ffd9ce1cdaa4be7467f32b01e02f4f4afc6530a

  • memory/5004-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/5004-658-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB