Analysis

  • max time kernel
    119s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/08/2024, 07:30

General

  • Target

    6b76a57e1778626b3e13eef62892a670N.exe

  • Size

    21KB

  • MD5

    6b76a57e1778626b3e13eef62892a670

  • SHA1

    ba85be1c8f134597f95d737678f9e6a86611352c

  • SHA256

    1dccdda159c0652f4e26703e8ed4edd376bc39b9fa5283f2b3394dcd6d16ba48

  • SHA512

    1a4c728bed750ff175cf0bd7f2e98ad3c6b5523c3351a141f7038a5a0ffd4a16d7c035d76cededa8323f5542e076a7968a29aee0919865d492df6dd9a5768f45

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJcbQbf1Oti1JGBQOOiQJhAT17IU5c5r:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJV

Malware Config

Signatures

  • Renames multiple (4676) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6b76a57e1778626b3e13eef62892a670N.exe
    "C:\Users\Admin\AppData\Local\Temp\6b76a57e1778626b3e13eef62892a670N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3108

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2392887640-1187051047-2909758433-1000\desktop.ini.tmp

          Filesize

          21KB

          MD5

          ea437b0210501b3625c0e532eb8da7d3

          SHA1

          be9c66e0e1aa75caa9ac9c2b477ac6e2dfddd711

          SHA256

          34fc0f7e0d419bf82b3044e00eb838fa94e05ad49970bf96e7fa7e81d6eb8d10

          SHA512

          6f7b45667847cade9d97c1e0b9aceb295de22f8e063ff512629efb37aecbaef45843c79c2701135fbbaf3e4a75be1161e259678fb0318eb8dfd91ffb72a1afd3

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          120KB

          MD5

          4c70b44dc7ddb9f185d8d8e3e9e1c442

          SHA1

          4edcc3ca287de429642e819e9707ed0a78e036d4

          SHA256

          70b301035dc26f91a800ca164ef6a04e447d5897280ed7a2e87e597554e82dad

          SHA512

          8da14d43976e1aa583f972c6ae5087eacd26e7b3dc246ab0a3caae007acfe5d768809296200d0d0acd67282296b7b006add68153472bf0baa885716d33208a00

        • memory/3108-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/3108-1206-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB