Analysis

  • max time kernel
    119s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 06:18

General

  • Target

    6fdeecbe4a703ae8c9ba0187ffebd7a55ade89cca8d5c251d845ac32900dec2bN.exe

  • Size

    25KB

  • MD5

    b046c2b0869b17d855062e0a6f0392a0

  • SHA1

    bef96b677c2dc0a25099e074a9af7a3a44c336fc

  • SHA256

    6fdeecbe4a703ae8c9ba0187ffebd7a55ade89cca8d5c251d845ac32900dec2b

  • SHA512

    df819ccf578f77eba244c11dfc2c924915f8564bfccc4918ac172902cbd04de9fbd42ef3cfe38c5edcc21856bc0b032372d81333be291551d584e3d827668cd6

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJ1Evd5BvhzaM9mSIEvd5BvhzaM9mSsxmMxm9+9T6u77:kBT37CPKKdJJ1EXBwzEXBwdcMcI9p77

Malware Config

Signatures

  • Renames multiple (4724) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6fdeecbe4a703ae8c9ba0187ffebd7a55ade89cca8d5c251d845ac32900dec2bN.exe
    "C:\Users\Admin\AppData\Local\Temp\6fdeecbe4a703ae8c9ba0187ffebd7a55ade89cca8d5c251d845ac32900dec2bN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1194130065-3471212556-1656947724-1000\desktop.ini.tmp

    Filesize

    25KB

    MD5

    1788117ffe2226803df8a93a648c44ac

    SHA1

    4e71444125db4dd5a13695b6711837f3b8136dec

    SHA256

    5ace60c6114429e934783c0f1caa901fa6b3f633c4e1f70ac70e03dbc36f2994

    SHA512

    c5f4c6f7c8c5b32b0a0a2480a21d62f403e8c672fa55fe0a9f49ed50060991bdfe2df5ed1bb966e4823f4db1fbe57117e7f014ee005f89fe8a20493a234a7261

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    124KB

    MD5

    2631dd585d3daeae8f52562bf602f036

    SHA1

    e0d4fbb79bfb7edfdb0f88a485ab652396f07502

    SHA256

    a20c172795900c4b421f0b8b5f75520c014d39c90bd78bbcf064092c063b2833

    SHA512

    cd9ee081cb46b2ea319ec68f76d5be0672bb5a9badc902c800ae3cf8fb8288784b507c8d20dd1e2238bd29df1cb6690a8a3e197266415e0e595aae70291442cc

  • memory/1616-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1616-1076-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB