Analysis

  • max time kernel
    120s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-08-2024 16:20

General

  • Target

    f9135f3216c2ee3b0afedf06c74c6230N.exe

  • Size

    24KB

  • MD5

    f9135f3216c2ee3b0afedf06c74c6230

  • SHA1

    97de6bd99cbc25b1c9c69b5578879426b1a8c9e4

  • SHA256

    16497ebf6c1939d90f685c2cf7cff2b2b9e2a77ae19822d112a0a166e98c7d60

  • SHA512

    f373a996cdc64dc6463438637c3833cd3839eebb5571c21c89b140961ca886b6a02e976d5a6923a916d6a7775cb62cf13f5c7ee107f5ea1ff7f6c815e851767b

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJ1Evd5BvhzaM9mSIEvd5BvhzaM9mSsxmMxm9+9TNYmAE:kBT37CPKKdJJ1EXBwzEXBwdcMcI9T+MD

Malware Config

Signatures

  • Renames multiple (4690) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9135f3216c2ee3b0afedf06c74c6230N.exe
    "C:\Users\Admin\AppData\Local\Temp\f9135f3216c2ee3b0afedf06c74c6230N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-945322488-2060912225-3527527000-1000\desktop.ini.tmp

    Filesize

    24KB

    MD5

    aa41e359264d7fde2c2694c2b5283baf

    SHA1

    ec5f1af52a680eb96b798a858c64dca76dad8b3c

    SHA256

    cb650f0eb2d8ee43adeab2d4142bc1fa3e7c302f47ade2dfcbc8f813971dc0b0

    SHA512

    71114d17184cd0190a87abcc9ade352222682caa63373318801c08ea48bd77af25db1e2473cb4dba4a3ab9f0b649bde63c06b523e1aef506eecfde4e9726eeef

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    123KB

    MD5

    aa53374cd4b64cf39b3fc9376c072e42

    SHA1

    ea8d20546db87935db35e669e430292cdcd4dad1

    SHA256

    bbde3bd6a71fab2631ff19c058bbebf93564314327717e052981dfb9d2e8f5a9

    SHA512

    9c8d08615a269e3ccc0ece94c6d74cf5cbd690845b1e1422048abfe49d3a8469e98a72c231eacd0022bc6dbd9e7a947a25e926e44b2cccf53c40b7dfe355e3de

  • memory/1004-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1004-922-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB