Analysis

  • max time kernel
    120s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 05:53

General

  • Target

    fbd7f255ee403fdeae1f3607b05076bc1c82a790bcd864b6fa57020a80f82933N.exe

  • Size

    59KB

  • MD5

    433333e13d19e6c7e8ae5f8a4f572340

  • SHA1

    8d2de0295e1bcefa88529b7962eda6722af92dda

  • SHA256

    fbd7f255ee403fdeae1f3607b05076bc1c82a790bcd864b6fa57020a80f82933

  • SHA512

    51cb4cba0b915970f0bc6958a4b1280f08f30a1a7e18a4bc6595d8d9441d75897e5db4d51a1b86d2b15e1e317d14076d5a8c97d111aab760ddd476d18d5fb5b3

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJTU3U2lRtJfO5mdGwmdGC6E:V7Zf/FAxTWoJJTU3UytJfO5mdGwmdG0

Malware Config

Signatures

  • Renames multiple (4669) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fbd7f255ee403fdeae1f3607b05076bc1c82a790bcd864b6fa57020a80f82933N.exe
    "C:\Users\Admin\AppData\Local\Temp\fbd7f255ee403fdeae1f3607b05076bc1c82a790bcd864b6fa57020a80f82933N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-523280732-2327480845-3730041215-1000\desktop.ini.tmp

    Filesize

    59KB

    MD5

    c592bf4b14842585d748b651edd5b532

    SHA1

    b27dcc3bb28fffac018b060106a73de3b675759e

    SHA256

    2f721627c2b4192e5038cec884bbde21ba84b959d6a371f6290c9b7434a267ba

    SHA512

    3b77ee1bccf6ab9af252eb5ca9dbebc0f4f0254124f930ebcb6d67985067aa89a5cbf49d1e3126e811f579886330886a90f95e70af324af6c249df6e6f4054d4

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    158KB

    MD5

    b70b2d18ecdf1ae7ab631c9e549a5277

    SHA1

    4bef61fb91d5a75b6626b46dfec746b66001e07e

    SHA256

    aa2c15df175366dfb4a217a5109a4e6f1843f9aeb0645148d657d667d0fd0ee4

    SHA512

    64783598780dacb6e0485dab70dec9cf71e4ba41fea2aef692010bf91339e85f4309c933ccb6ef91d6c3700db240cf5dc03b381ac0c978bce214b2e4d5f32352

  • memory/3088-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3088-952-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB