Analysis

  • max time kernel
    120s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 05:59

General

  • Target

    f6a9fd0c0298ac82c32bb05ae71494b26486a6b3d9ae23b36644602c659cc59cN.exe

  • Size

    47KB

  • MD5

    dd9cd7f680851a4bbbc5b5e884cf1130

  • SHA1

    a1d7e1ddd89f4bee26a5f2fb8b3614246d7144da

  • SHA256

    f6a9fd0c0298ac82c32bb05ae71494b26486a6b3d9ae23b36644602c659cc59c

  • SHA512

    b69642af83f249765c5f73c67f6f752d4dada14f2572065e822a9d964439493e2428011fbbd1c9be18779b23f611f46d2e5efd03140f4a0d0cecd62de812ff30

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9pJzjJzX:V7Zf/FAxTWoJJ7TXJzjJzX

Malware Config

Signatures

  • Renames multiple (4679) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6a9fd0c0298ac82c32bb05ae71494b26486a6b3d9ae23b36644602c659cc59cN.exe
    "C:\Users\Admin\AppData\Local\Temp\f6a9fd0c0298ac82c32bb05ae71494b26486a6b3d9ae23b36644602c659cc59cN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-523280732-2327480845-3730041215-1000\desktop.ini.tmp

    Filesize

    47KB

    MD5

    1addf15ca2798048b6a6dcb41cf0f26d

    SHA1

    2af049ef1d3715300aa7f62c1661f4b4720579fa

    SHA256

    acb1bc98474622f00c8f4aeb42a4c85278623cf25e0b8cd0196a8827235a2b72

    SHA512

    231d6a433a6ba7610cf9be10b491c4e689c0a27f969dc761c374a19bfb027b3cb1ab6b85106aba8eef0cd64e4e87c035f95f51f8c200c8e9e556f11422ebbb9d

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    146KB

    MD5

    3aa0fe41bd8efb1e7d39704078bffc03

    SHA1

    b972acd08b32f83c242932bd8be4516913d3662e

    SHA256

    7dcacd6b5c655df5010a355d3703f6a8c5ec1c189c2e8caa52717b699665999f

    SHA512

    c83b3cd396081234da4cc2fb092cfdbd82b8dc8b55688a48aad181f7e3b8c0cc839f7e74034a6141a9ead3b2c20da7f35795eef53b11448216aaf9c732ba3332

  • memory/2684-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2684-1006-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB