Analysis

  • max time kernel
    120s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/08/2024, 13:31

General

  • Target

    83e84fd474a199a3b76c465398c0d100N.exe

  • Size

    75KB

  • MD5

    83e84fd474a199a3b76c465398c0d100

  • SHA1

    6cdb719d205bc62998d27d33704d506675c1a7ec

  • SHA256

    9364faffe801d9bf6cac6d3ce3baf0e7f7d2d175aaa2deba9c68061c9bb2046d

  • SHA512

    5f27967b95850cc93e1db7181f7dcde7ca537780630f570ff3622554e99fd9721209a66475e1eddbff63d54d4a1a4cf4067d7ff53acc4fbc358dcedc78c1f431

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9+BT37CPKKdJJ1EXBwzEV:V7Zf/FAxTWoJJ7TSTW7JJ7To

Malware Config

Signatures

  • Renames multiple (4643) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\83e84fd474a199a3b76c465398c0d100N.exe
    "C:\Users\Admin\AppData\Local\Temp\83e84fd474a199a3b76c465398c0d100N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1448

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1302416131-1437503476-2806442725-1000\desktop.ini.tmp

          Filesize

          75KB

          MD5

          d37d8bbc23140e846a1f1de210ad49e6

          SHA1

          8ba86becea46f20629aa3b33ab75feec80b764d1

          SHA256

          8616465286de305e2a18f1ae0a0c4b65e17c6b0deeb543cbbcb62f8a6e764cd4

          SHA512

          be53cc0d5202a50a43959385c76270f4721f9547d455bb3bebc2e570ae9571e03d3654e28c699e871ae7eaaa173d243a6caa48dad79d16cb3a2de63a26e3beec

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          174KB

          MD5

          b30771995727c23643053b8f1f604c36

          SHA1

          5f68e5be9bb8c98109d664951a9c0510ce495bef

          SHA256

          7f60d1d17c901db8feb234f383f7b797902fe8ccc867f34600f723940d57740d

          SHA512

          175c13237b8038d7d08794d6c827e77b3a458a6a6f52201ae8d06601987c7b2f12cea89ab3b93a5f6cec5be74e2916b3cfa7736d74603339a05af81dc19ecff7

        • memory/1448-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1448-860-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB