Analysis

  • max time kernel
    119s
  • max time network
    108s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-09-2024 12:20

General

  • Target

    fbb84ceb67bff40bbd47b1dfe1e211a0N.exe

  • Size

    27KB

  • MD5

    fbb84ceb67bff40bbd47b1dfe1e211a0

  • SHA1

    23c006da0e9773436d17b49b30816995cec5011f

  • SHA256

    30b358c3abaf8a757285d02cd523afdc31ab3eac8bb82917c51b3b35b5637a39

  • SHA512

    ab4fcc89ceed7a1488fa9b983648351627b545c6cbafa62067e13f6db10dfc45efe0bba9c7a0f168e3ebed710df8fcff100399c8cf28e807009f1392bb867b9b

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9HSXM2MN:CTW7JJ7T1Ss

Malware Config

Signatures

  • Renames multiple (4680) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fbb84ceb67bff40bbd47b1dfe1e211a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\fbb84ceb67bff40bbd47b1dfe1e211a0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-355097885-2402257403-2971294179-1000\desktop.ini.tmp

    Filesize

    28KB

    MD5

    d4ad70ed61d1a5d7404bcba9e06dcbeb

    SHA1

    eab0996ed7bba1267826f2d37d724f2243110760

    SHA256

    3f4d73e8f2d87a808aca78cbf6bf458a60d913cb431f01c9f634e148fd6ae593

    SHA512

    d1322b2adff0e09e3c81d2d560225c840a7beebdafece12cfc63fe31a94d2ffef166a7850909311f51acdf03d8927709f59dc281ebf56dc91d73164f687ad1d7

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    126KB

    MD5

    89f2ef71d1a22a9b9ce325f2d4a91075

    SHA1

    e6b86d05f6ba760912801fd6c649192e03d110ee

    SHA256

    069e381e4de851ac279077e7ff495804921666f21bfff3d1dc06da3b3fbc9574

    SHA512

    781e80dac6f1c371be00343520e39ec46ffb1a8269f0bec9d3642bd17853ae923a0b44823120092458e517f2e80d23fc484396a312e333591354de89ebcf1ae3

  • memory/2700-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2700-936-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB