Analysis

  • max time kernel
    150s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 04:09

General

  • Target

    9c6ce897f3d3c9d0e1f6774022cda249474489734d7609335d178f510aa687c7N.exe

  • Size

    25KB

  • MD5

    5b73fa96512db9a9953af6551a8bbff0

  • SHA1

    a74f2c7f5ac968082b5fa2b7b2cd33be7d978bca

  • SHA256

    9c6ce897f3d3c9d0e1f6774022cda249474489734d7609335d178f510aa687c7

  • SHA512

    f3dd7f0f5e8cd0b703343ac1bea04ed91919100f1badde4d4103a43e4bd140275e664af841709fd2f453f29f944d85ab0c36024191b0c13a4e9c52be521bcafe

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9AiOiA+c+N:CTW7JJ7T9

Malware Config

Signatures

  • Renames multiple (5348) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9c6ce897f3d3c9d0e1f6774022cda249474489734d7609335d178f510aa687c7N.exe
    "C:\Users\Admin\AppData\Local\Temp\9c6ce897f3d3c9d0e1f6774022cda249474489734d7609335d178f510aa687c7N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4336

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-523280732-2327480845-3730041215-1000\desktop.ini.tmp

    Filesize

    25KB

    MD5

    e4d90c699b8adca276a747131c1b8990

    SHA1

    f1fdf9a70582722d4cd5237cf781ef5e531b3de8

    SHA256

    918388d3df422f586f25954711df01109344cfa96fb39218b5da293b3800306d

    SHA512

    be8f1157fe55841c9257337744098c0eed627bc46b0f56e98d929f4275a6c8160edc0332642a43cbb0f1bfc5e7c131653fdbf241a912ac96b2ec3771f1aa9adb

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    124KB

    MD5

    a635d6366edad9ca6e2ce953dc7b38d9

    SHA1

    6f3f495822e119833dcb3c45544a6abbc3798470

    SHA256

    a78dc125060f60b4ee3399ef6e0cf68581d00e76734b807be7a2909673d74e4d

    SHA512

    1aa3782ab7898b2c23eccd22961f94725efe82b7f179ceb9d7ac8e37414b58e9d5ddb5dafdd8a1e88a785136512c51b074e04613740ae440c0b233f96b228bc7

  • memory/4336-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4336-1081-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB