Analysis

  • max time kernel
    120s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/08/2024, 01:02

General

  • Target

    6a4119fd592e69c86c8e4f08a7e6e870N.exe

  • Size

    72KB

  • MD5

    6a4119fd592e69c86c8e4f08a7e6e870

  • SHA1

    fb42be3f1464654c845dd9aa3173da476d3ccc29

  • SHA256

    ba274ea2de487b6b360bdc45a944b356a6813d5473a7a9926937e4d0f6ef0947

  • SHA512

    5dbd6a0d6a0956fe69923549805b036f62d120c902c5d3b133c71513c2be5e473c782477122fd6ee3f7cbf8c120123e02ad532a42566afd9a544690d2b72e7b1

  • SSDEEP

    768:a7BlpyqaFAK65eCv+cIA0fm7Nm0CAbLg++PJHJzIWD4adZdhAIuZAIuniXKqAJxg:a7ZyqaFAlsr1++PJHJXFAIuZAIue

Malware Config

Signatures

  • Renames multiple (4605) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a4119fd592e69c86c8e4f08a7e6e870N.exe
    "C:\Users\Admin\AppData\Local\Temp\6a4119fd592e69c86c8e4f08a7e6e870N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4172

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2412658365-3084825385-3340777666-1000\desktop.ini.tmp

          Filesize

          72KB

          MD5

          3e9cfd1f3bff06b8c203ee50ad5a9948

          SHA1

          e6de94cdb06a2e988e26a4d42aa84797d4caa604

          SHA256

          009f822c67d4c8346aa84aecd023a77af97727acc581076afc189a94aacce75e

          SHA512

          acf9bda2cbaeb5ffd0e69d769a2229cda4722348dc2dcd92d8d795d4be05b05f98c22c41bc8216d19a7bcc695c66fe8b51e86c322fb7c0aeb040449e03a42fd6

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          171KB

          MD5

          ab9d97ddfd7f1a1726b0039eceb5be71

          SHA1

          f9eef2351c6d6aba903110ccb9ad3587121906cc

          SHA256

          5ff6920db3887faa32c04b398ec2d1b13d0de4f697f23bede38bd31ce1e369b2

          SHA512

          4ab8f4aa43489a4856c92e7fcb83ae13c479c4b3949e78f023181b64658c5715e66cb477dbdc39bbab34f9c90d58d9a66f27558e699c89bd16c8283be8218db9

        • memory/4172-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/4172-1894-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB