Analysis

  • max time kernel
    120s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-09-2024 09:06

General

  • Target

    b62c6e0703d82e11236088ef6db4aa40bd91e1430bfd916e68a164c2c66780c2N.exe

  • Size

    636KB

  • MD5

    50598053f074ac748305775d3e749650

  • SHA1

    0c69d1a766cc72aa53a54cc0d0d19609de1b0205

  • SHA256

    b62c6e0703d82e11236088ef6db4aa40bd91e1430bfd916e68a164c2c66780c2

  • SHA512

    8743943fa39affbf43018a9d58dee47805622cba3d79697f3ddc44755b1c6ef35c16c5e0e1c7f0125dba09081238f2d6a0c359ea5bfc07c282ed20c0eaa58709

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9ebZoW:V7Zf/FAxTWoJJ7TYZoW

Malware Config

Signatures

  • Renames multiple (2445) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b62c6e0703d82e11236088ef6db4aa40bd91e1430bfd916e68a164c2c66780c2N.exe
    "C:\Users\Admin\AppData\Local\Temp\b62c6e0703d82e11236088ef6db4aa40bd91e1430bfd916e68a164c2c66780c2N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1302416131-1437503476-2806442725-1000\desktop.ini.tmp

    Filesize

    636KB

    MD5

    09b7c9c1455cc1c2a2576439369d53dc

    SHA1

    3671e66cd84c10ebd9abd47a12c6d9d516bd5a1d

    SHA256

    c90a5dcbd15a84307073ea1534195b4e87325b84339ba91378811d9a563c2756

    SHA512

    0a3d98118032ca7e5f62bc60343ba26c5f1057d88ea8b25776ae1fa9902df883ec2332fa38b286505450c11c9fc8a9dac609cff8f89ada332e99f76eb3eff78e

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    735KB

    MD5

    2ba965251844dad20345c13437fe5fa2

    SHA1

    12be3f7fa6f64be84db912eb82c5eebe19724dbf

    SHA256

    a619dd73de864973e031a23f8684747c533245422f60fc6f6e525ea5cb69b58d

    SHA512

    f609e50a6dbd43b0fd8d2b066cee93e7be94386985ca5cb06a0aca7ccddb9e09971090b6df533f6a239843f5f890b7a1a64c2e0a7a6181b0f872407b8875aeae

  • memory/1088-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1088-482-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB