Analysis

  • max time kernel
    150s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 08:34

General

  • Target

    9a08c60d5b03354210dc479f26500dd067d6f7182009e02504cf8f065c30aed2.exe

  • Size

    109KB

  • MD5

    aed57497d961973973568cb5d1fa4bda

  • SHA1

    7303d31829c3dffd8b7f4f79e918b4aa90b7f974

  • SHA256

    9a08c60d5b03354210dc479f26500dd067d6f7182009e02504cf8f065c30aed2

  • SHA512

    7bc86936c9ada3ef87ed4416bd7ff1dc79b5ee22a2bc4f17ee9fe9bae82775402d9bc2cf28cfa071a24a4c0bd33d1ed8e8421ed9ee889d91f0aed5a7eda3fbb1

  • SSDEEP

    3072:fny1tE2tEtyKoIWbsHfySkT5GeCyi348oWGRPOzkjId6q8UdrSD+kCoIfL2YwqA0:KbEeEz

Malware Config

Signatures

  • Renames multiple (4665) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9a08c60d5b03354210dc479f26500dd067d6f7182009e02504cf8f065c30aed2.exe
    "C:\Users\Admin\AppData\Local\Temp\9a08c60d5b03354210dc479f26500dd067d6f7182009e02504cf8f065c30aed2.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3260

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3442511616-637977696-3186306149-1000\desktop.ini.tmp

    Filesize

    109KB

    MD5

    99cceb517b5cd0e0ecd72a828d25e2ac

    SHA1

    df843c88ebbba8ac11f19806f845d61bc21e82b0

    SHA256

    259bf54191374c303c500444413937d6c4f63e91e92c0ba66f17b9ca380979e2

    SHA512

    a6f2ff21cff608d903b4a08c828a423d67a090724e139a94dd9a99e7d86cb250b08d29eb9feb188026cd217678852dcd817fbc48401d7bc44324082725989b32

  • C:\Program Files\7-Zip\7-zip.dll.exe

    Filesize

    208KB

    MD5

    970424fdffc93bea36205a87a97a8773

    SHA1

    6495fb48a71b0fe6e90fa0f45b20c0ac914ece64

    SHA256

    55759919017f9e06c7ff78540fec1e3b0aea3dbf184d7c64b82b4fa2c9bd6af2

    SHA512

    2fc8f57a58435b4a1d5f8f628ab736bdabbd09d2701d4433781004b1e2398ffa5d167ff026f8e1b0db81db4cfb900a5b8f3f663a90816ac35c25b7a52d8e6226

  • memory/3260-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3260-650-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB