Analysis

  • max time kernel
    120s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 06:10

General

  • Target

    f7967644e36e4d045c5b464ae877bfda20e56954453aa172d72fbd16bd3dd62dN.exe

  • Size

    26KB

  • MD5

    d68e7398b4ef9918125728b7276527f0

  • SHA1

    a269851f45485d9320d5a315df09142c1a7f8bec

  • SHA256

    f7967644e36e4d045c5b464ae877bfda20e56954453aa172d72fbd16bd3dd62d

  • SHA512

    0a8cbf883151c04c824a679ae1dff31ec64e68391b1774fc484e6b201d94c80a6856180a237be3e4f7458d097ae990ab848fb7030016221b1a4f4c4c189ecc0c

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9AiOinN:CTW7JJ7TJ

Malware Config

Signatures

  • Renames multiple (4664) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7967644e36e4d045c5b464ae877bfda20e56954453aa172d72fbd16bd3dd62dN.exe
    "C:\Users\Admin\AppData\Local\Temp\f7967644e36e4d045c5b464ae877bfda20e56954453aa172d72fbd16bd3dd62dN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1302416131-1437503476-2806442725-1000\desktop.ini.tmp

    Filesize

    26KB

    MD5

    c65e8605b6e0743a44004afe21bd0cf8

    SHA1

    5a31976ef1f8428ba73247bbee5ae57b103cfb2b

    SHA256

    c06d9fe5760c41afad49fa00361c527ada9ae89822d19ba38b9e7752431bd0e4

    SHA512

    63c3def406ac372a8bc6ceb6343dcf2c0e3f3f92a7fb0886c0d3df62980a18708a98b799e1cb27955761ec3ba58ad0d3906fddde3e2b6a0470e87fa9311cb1d1

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    125KB

    MD5

    06a41a96e017a3a905e456a3c6b20086

    SHA1

    18cd10752e879fdc31b6ba40c2b6db93637b31b5

    SHA256

    782fd1cc21cfa534786cce37e3d40063953a44983d74a546488c016cb0dd9502

    SHA512

    71f06d6961aa90fd5d7cdc5dda29d63e20176969118b7a08d6794c941c0f244906eba932dd305f885dab45ad8a5d14dcaeb92ed56064fcee2ec886a561eed8f9

  • memory/3548-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3548-977-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB