Analysis

  • max time kernel
    120s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-09-2024 09:11

General

  • Target

    db725b08abc4d166ed7439aa6939ee6a110e8bac9c2e91fa674c7ac4a995e4d1N.exe

  • Size

    78KB

  • MD5

    27e63555d42eec6cb432100b18793be0

  • SHA1

    ac99102c13d14b33edc4e536b5238e5474362efc

  • SHA256

    db725b08abc4d166ed7439aa6939ee6a110e8bac9c2e91fa674c7ac4a995e4d1

  • SHA512

    f6f29d6476197c56d70a329df70eef8b3c064b981daa0eed8b45dc700f975fe2090056b4dc1f2d67d4ea12b3893fbed4320b5e010057488ee5c199391c3af216

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI982AZJE2AZJ/WBT37CPKD:V7Zf/FAxTWoJJ7TMTW7JJ7TlKX/8KX/l

Malware Config

Signatures

  • Renames multiple (4645) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\db725b08abc4d166ed7439aa6939ee6a110e8bac9c2e91fa674c7ac4a995e4d1N.exe
    "C:\Users\Admin\AppData\Local\Temp\db725b08abc4d166ed7439aa6939ee6a110e8bac9c2e91fa674c7ac4a995e4d1N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3564

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1302416131-1437503476-2806442725-1000\desktop.ini.tmp

    Filesize

    79KB

    MD5

    cbb7423cb42694df57312d4314d852cf

    SHA1

    56838e6c5483ab6ba44be843f5f70f415e6dc509

    SHA256

    e2a0da39ab0e3c3a439e21545eb93596992051c5de497a701a443101db3aa65f

    SHA512

    20b933a729130d6b3d6c5df76fba53c313a435d0c2a7312a493f9a8e58af4ad81caf1282d92d7bba4cf4104fa5f3d1cab761ba26cbb6bbe7f66910b16196b375

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    177KB

    MD5

    d504f54ea561b6d3744bcddfea9e1eb3

    SHA1

    4748e889f1f1b2b12550387519747523bc5e9235

    SHA256

    1001c280a86e3ae5ac547a36f02b1375ba1dd327eaf88af5984bddaa48a6c06d

    SHA512

    e60c0090f2bda544745472b6f44fe2cda9c5a09fe05a6c4cf9b209b17b682819eadf044a36b7aa45a5bbc07056b42736bb28cafad59570b2b89dd7b2086a0a49

  • memory/3564-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3564-936-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB