Analysis

  • max time kernel
    120s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/09/2024, 22:47

General

  • Target

    c6b9dd41d62ab54b09b7e780daeac5a0N.exe

  • Size

    92KB

  • MD5

    c6b9dd41d62ab54b09b7e780daeac5a0

  • SHA1

    85aaf604dcd644341282bc480cf1338e98b3aa84

  • SHA256

    799045d430d4c4c3368bdeb38ad78ba5703f1099bad72b3086e1f1bb5954ed89

  • SHA512

    824ee1d8aef2a78ccc7a12363c3c6d2e96a3ba60338739e555bce558abd54f527994b4640c388adff21f1f9ed8cdcfd795442e87499e3d084c72b3bcb5536f36

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxSLz:fnyiQSo5Lz

Malware Config

Signatures

  • Renames multiple (4362) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6b9dd41d62ab54b09b7e780daeac5a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\c6b9dd41d62ab54b09b7e780daeac5a0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2412658365-3084825385-3340777666-1000\desktop.ini.tmp

    Filesize

    92KB

    MD5

    2f0d7994969d2e9feb5b2530bf1b6eba

    SHA1

    b2b0c73319e9fbf054763e03a4a1666024e1b769

    SHA256

    a29ee50630b6056cd65869811015b82ead2e638958cc15fc38145107594658cc

    SHA512

    17b7a37956f2255e211d590d962c9e7035d9958cb2e3101653e7decce14dd49193c3848a6291c7592a2aafa168cbb9a4b0f604650623f84395e075b0ced2dc2e

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    191KB

    MD5

    cb065ffc7e7d066b109f208258e35f5a

    SHA1

    611f0e048f05f7b23bbfbc207f9d3959917b88cd

    SHA256

    7732a937a5956a028db15e52c8f934016123c49109067fd0ec02f64d08e43f57

    SHA512

    4554a1925e6742926e1fcce69aef176e186057b8cefc4802ef445eecceb40e7e1852e334a4b7a38991f7af49fa4a031f700b3c81e4bb1e2596569a4fb10a7383

  • memory/3840-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3840-850-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB