Analysis

  • max time kernel
    120s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 08:46

General

  • Target

    10743ddc2119def10be7da51e4cacae7f4a16db644fb69bddd9a6acacdb8a644.exe

  • Size

    119KB

  • MD5

    77ef3d32ba6d47d9839b0ab1bcc02872

  • SHA1

    dd7672ff75e8d7ab254ad0041491f107a114f25c

  • SHA256

    10743ddc2119def10be7da51e4cacae7f4a16db644fb69bddd9a6acacdb8a644

  • SHA512

    796a8a2e9438f9552558dcfd88e23fab5c3a634455fcd6df79510e9af53393eddf041b9774f76ddff346c95c4eb91570fddeb3a9ff7748fb44f244008c73f325

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATBHfBo8o3PViYl0:V7Zf/FAxTWoJJZENTBHfiPViB

Malware Config

Signatures

  • Renames multiple (4211) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\10743ddc2119def10be7da51e4cacae7f4a16db644fb69bddd9a6acacdb8a644.exe
    "C:\Users\Admin\AppData\Local\Temp\10743ddc2119def10be7da51e4cacae7f4a16db644fb69bddd9a6acacdb8a644.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4089630652-1596403869-279772308-1000\desktop.ini.tmp

    Filesize

    120KB

    MD5

    2943893d9e4936a803421bf457f7e9e2

    SHA1

    35f6e5bdd72a2e8e0745b3eb39698dea947c8223

    SHA256

    fefb3c901cc00f6ae200cfd63dea4ab74206d0023c3c0f4860c3e5840f66e28a

    SHA512

    d7f74ee23b96fcb16fdacb524433e38ff91fd83428be2cfccf9e5c00a4492229c9d8af469c70e1e2b33ca7c00d102ec48019f4afc57f88b0cc5d380569e42d10

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    218KB

    MD5

    38bf6053643d32140f48df587e23a48a

    SHA1

    5e711097a7ec230c5f7609d631fbde8d93219dd9

    SHA256

    9c8faaf51e0924b6f0a7f78624aa5cc9663e25062e4f6b6b234ac11d8b1e0df2

    SHA512

    486ce4c6040bdec67e107b67a20734d0c4389946691a96ab252f6f344e851a4dd8f5b073b9a603becbad6167a0471bcdd447c4d6e55848a1897dbd6bd596c313

  • memory/3928-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3928-656-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB