Analysis

  • max time kernel
    119s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-09-2024 08:56

General

  • Target

    d68a3e26016aeb95a4ddaeeae80fd72dc6a7635ac68ff6dfc58b6913e6704c42N.exe

  • Size

    62KB

  • MD5

    a6f47ef603f3f82dd17e27481eb41910

  • SHA1

    a29d704694bea30ad75c6891dccf6bbfc3f1c87f

  • SHA256

    d68a3e26016aeb95a4ddaeeae80fd72dc6a7635ac68ff6dfc58b6913e6704c42

  • SHA512

    91c73eac6e1bdf16fb68e3f4976f1d51a6a1dedf2d8b647c909465380beee35d868cdf8ccc670b3c891f96bece35b6233801759664c047ba262c0b7533468640

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATBaH0PcR0PcXn5S:V7Zf/FAxTWoJJZENTB4JRJX62feNdNt

Malware Config

Signatures

  • Renames multiple (4678) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d68a3e26016aeb95a4ddaeeae80fd72dc6a7635ac68ff6dfc58b6913e6704c42N.exe
    "C:\Users\Admin\AppData\Local\Temp\d68a3e26016aeb95a4ddaeeae80fd72dc6a7635ac68ff6dfc58b6913e6704c42N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1302416131-1437503476-2806442725-1000\desktop.ini.tmp

    Filesize

    63KB

    MD5

    83234bc13fc44b2daa75246de95beb44

    SHA1

    f0953c9eabb9f981470e4e8affc3d6ffa1ad0c06

    SHA256

    414426c2cb5711d3b978016977c4f5f920a58509fa5a01fc32632256c6d35928

    SHA512

    0f3b4b7b9ae4cf867f58073db73567ffcb451789548447e455bb5b07e28aaa1798c063a848bbd6bbaf17f8ff70b16bbbc3d8b0734eb180ddc5cfee014908dad7

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    162KB

    MD5

    e240d6e97b7e5532e664e31d5f50a3c0

    SHA1

    408b705411e5960d242d007d5da6ce811653062a

    SHA256

    fe80ded233749378750e82b29ddab4798903401f44d23fdebcf6881af3ab99b1

    SHA512

    307be75b805e8b6ec17e4e56577e4e9e7612cb95cbe70a1c6f43ccb1bd6d9bc46d9a793eab58ef1fe586b2cbc844ce5cdf1475e5f35abca55d93f09b34c43c4a

  • memory/1812-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1812-912-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB