Analysis

  • max time kernel
    120s
  • max time network
    92s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-11-2024 05:19

General

  • Target

    d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe

  • Size

    81KB

  • MD5

    00c5970860bd59108bb62088f360d4ca

  • SHA1

    2096744c436fb4cba941003ed5f619004d672b90

  • SHA256

    d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc

  • SHA512

    5247a0757e1da01c5f7f290ee7db3d74aa6ea7d9941b1832e029cbccaa2f10e4ec663821f64e66ed9848badf1a714ef087eaaff3d1fad9414a4db7c27f52801e

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcwBcCBcw/tio/ti3c7Fc7Np:V7Zf/FAxTWoJJ7TTQoQmoNC4Co

Malware Config

Signatures

  • Renames multiple (4310) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe
    "C:\Users\Admin\AppData\Local\Temp\d0d3ceda3ac427334cae4d6c6657594ecd06dc79153c6ba4a12dfbd367f3b5dc.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2878641211-696417878-3864914810-1000\desktop.ini.tmp

    Filesize

    81KB

    MD5

    57cb3fb4ef95b3540a993792c97f522e

    SHA1

    a5827c6a98c10ff468ab6af78618fc7706dd9226

    SHA256

    62d52446d8ac1be7e1c566961b4cd713c66babd7c987089a3845a1ce18b77b6c

    SHA512

    22349300c3fa358fda606b73e26d4993b3fd01f599e5dd64eaac26250defd4c5559050c4ffa2a09abbd06c7a4194b9ad468d5cc64f19644712c717d640af876b

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    180KB

    MD5

    582e23f5fe8100d2a0577bf5bf522bbb

    SHA1

    9d9d742eb4c45a73ef63db03341847bc6c9a276a

    SHA256

    93d83564840f898ba55b6ff922d16550adde120310cc4417d511b46effa36181

    SHA512

    645ce3edbdc08d4d4cca6367b83b8500da372aacff814b01d60f922ad56de20d09b9cb3657a913696a2ad2f46e9845634663f01caca281da4b307969dbc1d923

  • memory/2440-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2440-664-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB