Analysis

  • max time kernel
    120s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2024 01:32

General

  • Target

    43ab8216568b650a8197b7da5f6f2ecc9306882f647e2c0fc5cf041d4579d8e1.exe

  • Size

    281KB

  • MD5

    b71ebb681af0ff0d0eca0d2b87785928

  • SHA1

    84d4359b96869916cafb46f0455f67a2f097198e

  • SHA256

    43ab8216568b650a8197b7da5f6f2ecc9306882f647e2c0fc5cf041d4579d8e1

  • SHA512

    03ebfd885f81f5789b58b9485c144aff1598c0a25a9584c6de779401f90eefd39b730cfb01e006d506c871a0c8c63a9bab4cfee7f41270244c1dac0191581367

  • SSDEEP

    6144:fEJIjNDv0bNXkbvLIEJIjNDv0bNXkbvLU:+IZGNXkbvLNIZGNXkbvLU

Malware Config

Signatures

  • Renames multiple (2771) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\43ab8216568b650a8197b7da5f6f2ecc9306882f647e2c0fc5cf041d4579d8e1.exe
    "C:\Users\Admin\AppData\Local\Temp\43ab8216568b650a8197b7da5f6f2ecc9306882f647e2c0fc5cf041d4579d8e1.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3756129449-3121373848-4276368241-1000\desktop.ini.tmp

    Filesize

    281KB

    MD5

    a7dffe890164a8b8bf38dbdf66420473

    SHA1

    fc7b11935df68185a0f91156c14600f5df8b1d8c

    SHA256

    cd968b698f800965a8fe60528c8fbc6709f5e19862d37e3f6d6a3542e41728bc

    SHA512

    f7a67fab4f76bd3f8b8bb0619a3a304942bacbe6678b70bd7e386aeb5bbe53019ddb017f613451484d7bd87af793a0f24347391f94ebc8f255bc18338882e981

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    380KB

    MD5

    27e0f692dfaacc9e4e96da9b5fefa475

    SHA1

    12167909f867220c61d3d0f9b06e7109e3325d99

    SHA256

    333acabc52124354e4caddd8d8e51684945b4b495d48d827ebf3f146da6f7c40

    SHA512

    a08d3b561e98a019c29a7fc449d74cb473e32334d509e884d35a6be585f2c92034e71401ae16813efd2951691982c4920dbd68f5d9d48cb15ae1d56ddfdb4298

  • memory/556-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/556-637-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB