Analysis

  • max time kernel
    120s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 06:16

General

  • Target

    f822026ba390711dc432ab0876013de527e63183b857e09bcd6cefd6b137deccN.exe

  • Size

    75KB

  • MD5

    66b80f13f4fd251a7ebc9a76f812cdb0

  • SHA1

    ac8c5bf40ec15c17d77dbdb4bdb480c230243ff0

  • SHA256

    f822026ba390711dc432ab0876013de527e63183b857e09bcd6cefd6b137decc

  • SHA512

    14d65c9d3f5ac0e7c8b5359b8647662a436d921f732f1245a00d158b5254cf2d6b652f24398496ffc7bbe15268d7dc5b83049a7a7ab297d32a93f1ac2714b01b

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9ebZo6BT37CPKKdJJ1EX2:V7Zf/FAxTWoJJ7TYZogTW7JJ7TYZoR

Malware Config

Signatures

  • Renames multiple (4605) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f822026ba390711dc432ab0876013de527e63183b857e09bcd6cefd6b137deccN.exe
    "C:\Users\Admin\AppData\Local\Temp\f822026ba390711dc432ab0876013de527e63183b857e09bcd6cefd6b137deccN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-656926755-4116854191-210765258-1000\desktop.ini.tmp

    Filesize

    75KB

    MD5

    0907686a3475edf05d1b17dacc2d4bd1

    SHA1

    5442246578cb8342f346d7ebcabf5ac09bf7a0d9

    SHA256

    033d8da31327cd49d0bc168c7a39419105531666355c654d158f650e56c536f4

    SHA512

    7c16ad6addd3ee0dfce379d3ef40c30239dded7df3655fea88926fe3efb3df74bbd413680a572a655effac5fb3086a817650ca01e22cf1986216aff7ddf92738

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    174KB

    MD5

    00f41a34f2b549fad33cb177830d92a5

    SHA1

    ebd1f3aa00afc686fe4701c21258f7caab57a5fa

    SHA256

    ae5678131fac2251f3eacf130338ed1b439003d0bca7dc9303676e85103e75cc

    SHA512

    c9ced3b3a961313146823dac987f7a82234bd78bad2e022234a8a7c368ee767cef9d7890b8bc169273f61389ddce22499c0dd84e66777cd01a39700d4f85d6d3

  • memory/2596-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2596-900-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB