Analysis

  • max time kernel
    120s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-09-2024 09:15

General

  • Target

    35f7968a6803c2af40d8cee1e44d08f46ab5ad08b71e6a0a0363da2f8455c48bN.exe

  • Size

    69KB

  • MD5

    f83abf8102e2fdd69aa0348d8e740e10

  • SHA1

    ed0c8c531af4204327a3c1dc6b055b01154bc9de

  • SHA256

    35f7968a6803c2af40d8cee1e44d08f46ab5ad08b71e6a0a0363da2f8455c48b

  • SHA512

    493fe7302fc224f79acd7168d5e1310bf914f13ea0689930939be4da6c047669b44cb8508211797fd8a1d6fea31379ecdbdf12953a9b0815d03c257151b183a6

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9MBT37CPKKdJJ1EXBwzEQ:V7Zf/FAxTWoJJ7TUTW7JJ7TB

Malware Config

Signatures

  • Renames multiple (4644) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\35f7968a6803c2af40d8cee1e44d08f46ab5ad08b71e6a0a0363da2f8455c48bN.exe
    "C:\Users\Admin\AppData\Local\Temp\35f7968a6803c2af40d8cee1e44d08f46ab5ad08b71e6a0a0363da2f8455c48bN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2244

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4182098368-2521458979-3782681353-1000\desktop.ini.tmp

    Filesize

    70KB

    MD5

    c9ec031acabbf65010f13800586e975f

    SHA1

    31dfbee23343c9ed35a8e4cc2ff20a6887e69ff9

    SHA256

    020edf5410aa1a4257e121340e9813c32ab2735e9c7f4eab8f554e32304d9d64

    SHA512

    9e5ecb667869d9774c8d340651352389540f36497131a315805c4300f0c4a29322b0c14d56a1d58c5122cfb6f08022d46eb5963dab00e99a78e26e9444392e90

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    168KB

    MD5

    ccce4ca459f314366f6f42c8d9d201af

    SHA1

    1bd1b4487d3a97ca16f9a60eb94f0e4062941997

    SHA256

    796434afa11d3a8db98d21d4e588c4ea7c1f98ad93abe880d00d8a9f93b12f1b

    SHA512

    7c12369f2cb5ed95f6b0d0122245fa0671b8a3b0d0727e820fb8d16241a028ed79e3e15b9dc770c87c06bfd889ab156e7ad3383a6d247a331311513f010703ec

  • memory/2244-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2244-858-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB