Analysis

  • max time kernel
    120s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 02:53

General

  • Target

    f6ad2c4e66965c804af0466678c26d38408394a19a0f249d97ab776c7c9adad5N.exe

  • Size

    1.1MB

  • MD5

    bd0dde1efb674791be13ea27154ddff0

  • SHA1

    aac6069df2462a7e95eb9a45227e4fe69b219a1d

  • SHA256

    f6ad2c4e66965c804af0466678c26d38408394a19a0f249d97ab776c7c9adad5

  • SHA512

    f99052428ad87ee5c6f28a819e6b235e376032bd8bd0f0a4a6f9b2d6b1fa17333f706dc417fdb195e8a93d48d499960d68c9dfd5916203bf7511104cf799db1f

  • SSDEEP

    6144:KE2Ni/HiiHiiziiobiio4zaqzamzaIzanCme5CmejCmeZCmeR:ViiHiizii+iioFe5FejFeZFeR

Malware Config

Signatures

  • Renames multiple (1751) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6ad2c4e66965c804af0466678c26d38408394a19a0f249d97ab776c7c9adad5N.exe
    "C:\Users\Admin\AppData\Local\Temp\f6ad2c4e66965c804af0466678c26d38408394a19a0f249d97ab776c7c9adad5N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1302416131-1437503476-2806442725-1000\desktop.ini.tmp

    Filesize

    1.1MB

    MD5

    0f675bf25432a5c8f590a4666c3b9eeb

    SHA1

    7721595789cf43228c243ca7b61bde3093a4ee25

    SHA256

    18093e984974887b2b231bc40c32fd3b81708de11c9c1663eed9419aaf65c5a4

    SHA512

    37aee567292c0f4e8fd06a107b906c5d33212d805e266bd1bf80cd5aa62ece31da211b56040569cb0d4bab39ac6bcab85d2182531781697461d4495a2f6ce4be

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    1.2MB

    MD5

    e4583e52f2800fb92fabe17868d042fc

    SHA1

    f3ce2df99acd8d5249ca228ae1530f464c40eb01

    SHA256

    b89946130fa3e4d1564555639a16cfe666741c1f50b42a5d8a2958064b4c045f

    SHA512

    e77b55a322134eeedf285817de86dd17d064e9996ce464acf393485feddce53612fa9eea2afd311d4a68fe0e5aa1ecc1b64e1f02d0598df537b22303275a1a7c

  • memory/4628-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4628-378-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB