Analysis

  • max time kernel
    119s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/09/2024, 08:59

General

  • Target

    cee2a83374ff5a9a5202e744b86ba81a90322c43272d6200e6f5db0af06375a2N.exe

  • Size

    53KB

  • MD5

    564c091eddf241a46e143b130de70f60

  • SHA1

    ab05c766e2725be4923d8466ffc2505251578587

  • SHA256

    cee2a83374ff5a9a5202e744b86ba81a90322c43272d6200e6f5db0af06375a2

  • SHA512

    7396758d1312235e263284b57cb721e05c3a080883b6f8b8c3ccc42a961cb14cf54f5eecb13fe617e4a595e707e79290d87ffdb3dff3f828aa48dcff22b3fccc

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9Uwm:V7Zf/FAxTWoJJ7Tiwm

Malware Config

Signatures

  • Renames multiple (4650) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cee2a83374ff5a9a5202e744b86ba81a90322c43272d6200e6f5db0af06375a2N.exe
    "C:\Users\Admin\AppData\Local\Temp\cee2a83374ff5a9a5202e744b86ba81a90322c43272d6200e6f5db0af06375a2N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4136

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-355097885-2402257403-2971294179-1000\desktop.ini.tmp

    Filesize

    53KB

    MD5

    50bbb5091cd5720777f8b33f0b02819e

    SHA1

    e9877479b5caa399f435a2021a59f0800f57e719

    SHA256

    18801178d0727c1a2f2f266b7303b613ad69f12b62e1846f0766e2c4b7ee58dd

    SHA512

    e7de25d3bf50de9a3d626890702169c6ab123a419e58b6a037fac493fe73d381627f41c91a770e3ce8cc2d400f29b8159a566d60b3eb9097ba1f9b572da3bf9a

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    152KB

    MD5

    09ac3f9aac4501fd4c544efbf2baf273

    SHA1

    6d36ab3db962532febba18dc051123f1c663ebbf

    SHA256

    7119e5deac3ad372369b3465a96daf4713ab3e99402cba3e5754669b8ee41d20

    SHA512

    7c8e37cb309687f8f5fd8fa82d6c2dba58699bfb26e6e47f02d1021658b36825e61cbd3fbc1e0fc2213f3c042904795bab827e9011633b9f38ff8963b3fa617c

  • memory/4136-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4136-910-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB