Analysis

  • max time kernel
    120s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/09/2024, 10:33

General

  • Target

    68dd5191379b300a60a7d526f9c57dc0N.exe

  • Size

    41KB

  • MD5

    68dd5191379b300a60a7d526f9c57dc0

  • SHA1

    1443628566c0eae800c8881868669f73872d5248

  • SHA256

    1596a48f3a41b38b93c3a446a237506b481aef8886a3f049cb3fbe119349ae51

  • SHA512

    99e4cb150383c116149781f88c6916010d6bd57deeb81aeb78c57d1e8d01245ffe81a852657a9f1994c9fd4468b7e38acbeabf7f63084d850498b2b3b0a55cdd

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9yiZEMry/ZEMry0:CTW7JJ7ToP4q

Malware Config

Signatures

  • Renames multiple (4676) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\68dd5191379b300a60a7d526f9c57dc0N.exe
    "C:\Users\Admin\AppData\Local\Temp\68dd5191379b300a60a7d526f9c57dc0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4072

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1302416131-1437503476-2806442725-1000\desktop.ini.tmp

    Filesize

    42KB

    MD5

    3d68a93698c042410f4ecd74783ea9c0

    SHA1

    769c5234f28995296768041fab48b5c6d4eb06bf

    SHA256

    71f94a305877aef6575ca74ee570d41424a1dbde4efe0850dbeba5969c0d2590

    SHA512

    29b66e119e99ff1cab5d2ff656c88a4f65834e57f78b0730ce3e9463b5de23e51fad40f290fa5fdfc242270ec3da3f8caf060400d6a40b2b6f59151851524b96

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    140KB

    MD5

    4de8cedb835dad66c493ace16501a1c2

    SHA1

    0fb3c81ad311800dfb88b74719abbc0d7bce2ceb

    SHA256

    b1d7beab0fa18b92e9ff856abbc7b3f8b5b4b659f7d9a90060fe95471687805d

    SHA512

    b5a7604f38bdf66f93ef457c411d24b9e73ce26c72c291ddcb9b1725a3691672569b0489102411276b05ee9146af480f97d907514baef4ad718242443662346e

  • memory/4072-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4072-924-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB