Analysis

  • max time kernel
    94s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-01-2025 17:37

General

  • Target

    458455e84390b7cdcc4008e104717ef1255245707e3329978a22e0129374d898.exe

  • Size

    160KB

  • MD5

    f33a0c04a1984e22cf953cc811f6d4cf

  • SHA1

    90eb7457e9952738195f7203bdde11ee8a77c8ba

  • SHA256

    458455e84390b7cdcc4008e104717ef1255245707e3329978a22e0129374d898

  • SHA512

    e241c70576f99f84575a05c5d1e9a112e91d3ebb1578d364dac1a0f5d25a8c7fff82ca8aa5e1a5598e7e0800c149f4c648630b41a6ae790e37713040d802d5fb

  • SSDEEP

    3072:vDDDDDDDDDDDDDDDDDDDE45d/t6sVkgZqltP3368+QBVBuEsMeUI/EQ9BW:R5d/zugZqll3LHVeVB

Malware Config

Signatures

  • Renames multiple (136) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: RenamesItself 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\458455e84390b7cdcc4008e104717ef1255245707e3329978a22e0129374d898.exe
    "C:\Users\Admin\AppData\Local\Temp\458455e84390b7cdcc4008e104717ef1255245707e3329978a22e0129374d898.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:628
    • C:\ProgramData\80B9.tmp
      "C:\ProgramData\80B9.tmp"
      2⤵
      • Checks computer location settings
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:4600
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\80B9.tmp >> NUL
        3⤵
        • System Location Discovery: System Language Discovery
        PID:512
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-493223053-2004649691-1575712786-1000\FFFFFFFFFFF

    Filesize

    129B

    MD5

    f5385207860ec573019ba5c8c90404d7

    SHA1

    b1d0c2ebcdd2b02d10728eafb61e1d2fbb7bee31

    SHA256

    982d6733dd72f3f3680c05c11e0962af4b443dda6fc4287acc8d6d07c1e9f6f2

    SHA512

    ebd9a75f142d42788fc706ab3e094df5ebd3989378de01338f2331524b37146e44edb48ea24e8f4f103fcabccb31508c96487634284ac77e00d37e54275faf77

  • C:\ProgramData\80B9.tmp

    Filesize

    14KB

    MD5

    294e9f64cb1642dd89229fff0592856b

    SHA1

    97b148c27f3da29ba7b18d6aee8a0db9102f47c9

    SHA256

    917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

    SHA512

    b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

  • C:\Users\Admin\AppData\Local\Temp\DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD

    Filesize

    160KB

    MD5

    26489252ffde78b41d1a16267fcaf4ee

    SHA1

    6f8bd27a6c6f1c84962c9eeca1dfddc8f8514d70

    SHA256

    b4e00f816dbe18927f599707af082aae1aebf6c84896daff9f3c5b37b698222b

    SHA512

    e8f7e6d6f25016db9c03b8f0bf193d9c2d05fc7fcff9b177dc14eaa697c45029c55b191a376939d26d0d4d6f322a1f6f7c459c902aa917028ccfc13694cc4301

  • C:\Users\XA2JxFVyZ.README.txt

    Filesize

    6KB

    MD5

    cb3dfa29031b2f1f36efef9e2ebffbd5

    SHA1

    0cd6cfe47e15b12eee343a972ef1f8a1b87e0071

    SHA256

    e9bb0e64c842c3d8bee2662a259be41965d0e0c5a903451b8a82d818b90f8d33

    SHA512

    6fb04632455dc389b842149a0c4fa60ab24d3994a29fc9af91671c1ffd9a11be53a4c9f55a0721ae7afbb80f960c3a7ec9ba5d9a4e243fea230f0a39db2e016c

  • F:\$RECYCLE.BIN\S-1-5-21-493223053-2004649691-1575712786-1000\DDDDDDDDDDD

    Filesize

    129B

    MD5

    a0a05d4f1c14074ef579f27350481c21

    SHA1

    8770cfd9cc30dbe8c651603a903d617689305645

    SHA256

    c47876e30e97c5ced7d0ea96d09994c6f0f95e59657084b3837538bf80846c50

    SHA512

    b493df17349fa5be5d33281ee210a8878298c98c1ce9d0605ce7f8a41bd9f06083aab465faaafb9dec2fda9e531d82058d15c8b4e88faa9d4322036ecdffc1bc

  • memory/628-295-0x0000000003330000-0x0000000003340000-memory.dmp

    Filesize

    64KB

  • memory/628-0-0x0000000003330000-0x0000000003340000-memory.dmp

    Filesize

    64KB

  • memory/628-2-0x0000000003330000-0x0000000003340000-memory.dmp

    Filesize

    64KB

  • memory/628-290-0x0000000003330000-0x0000000003340000-memory.dmp

    Filesize

    64KB

  • memory/628-1-0x0000000003330000-0x0000000003340000-memory.dmp

    Filesize

    64KB

  • memory/4600-291-0x000000007FE40000-0x000000007FE41000-memory.dmp

    Filesize

    4KB

  • memory/4600-294-0x000000007FDC0000-0x000000007FDC1000-memory.dmp

    Filesize

    4KB

  • memory/4600-293-0x000000007FE20000-0x000000007FE21000-memory.dmp

    Filesize

    4KB

  • memory/4600-292-0x00000000006A0000-0x00000000006B0000-memory.dmp

    Filesize

    64KB

  • memory/4600-324-0x00000000006A0000-0x00000000006B0000-memory.dmp

    Filesize

    64KB

  • memory/4600-325-0x00000000006A0000-0x00000000006B0000-memory.dmp

    Filesize

    64KB

  • memory/4600-328-0x000000007FDE0000-0x000000007FDE1000-memory.dmp

    Filesize

    4KB

  • memory/4600-329-0x000000007FE00000-0x000000007FE01000-memory.dmp

    Filesize

    4KB