Analysis

  • max time kernel
    120s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/09/2024, 06:17

General

  • Target

    f03cbb95f11885ffd1254051c2dc3620N.exe

  • Size

    65KB

  • MD5

    f03cbb95f11885ffd1254051c2dc3620

  • SHA1

    12848c346c241b79de6234d99d6e8e71b2a8c597

  • SHA256

    3335340e6dd5536edd033eb5f6ef8c68f3790e751ff4fb18e5db3f173fa3eeba

  • SHA512

    ea1a976d6fdcd388080bba526f2d7cf0f75b6a91db4c21e398eb94db15b5a9c08a8dd4f90294c3bdcaec96699faf0ff75c61f69173f37d53d4077502a1df7431

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcwBcCBcw/tio/ti4c6kjkw:V7Zf/FAxTWoJJ7TTQoQ4c6kjkw

Malware Config

Signatures

  • Renames multiple (4661) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f03cbb95f11885ffd1254051c2dc3620N.exe
    "C:\Users\Admin\AppData\Local\Temp\f03cbb95f11885ffd1254051c2dc3620N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:592

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-786284298-625481688-3210388970-1000\desktop.ini.tmp

          Filesize

          65KB

          MD5

          c655b40438501d62c5df170a11f17520

          SHA1

          e36a0445d4047f80efe210d236af8d4da49da579

          SHA256

          e4ecea3c829c7a613f17f7a72f012545056af7d492db60b49c562d7a18672c57

          SHA512

          408fca10f02276b88d0b2343f769200e8e55bdb986a8f6d074f4ec3e8137f42084aa8eb7b89564a7d69445be4901dfef7d7fc5099ad8c44c4701db386e55ce91

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          164KB

          MD5

          e7387a0eeb589d132efe655755ac3392

          SHA1

          2cd256d12bcbc0370ee0d88a7ad1de0548784cad

          SHA256

          92871c0da668c4b6ac035a9bbf19c81fd9353aeeeacaa1d12f92b10c1db20885

          SHA512

          fe569b7de12bf85138b29be5e523cbb4ba513460dd64662d3f7a17fb19b9ddd8687ce47b29af3228b151f1db2ca78881841c0d453554020f551cbd81cf0d693f

        • memory/592-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/592-906-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB