Analysis

  • max time kernel
    120s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 16:55

General

  • Target

    c7f6ad77097999788bc0a6342b20e793601a3fc0e1b2e837612c1e8857e4a56dN.exe

  • Size

    54KB

  • MD5

    016d3e10ad62e3de9cc5257d1e5200a0

  • SHA1

    b402af47671fcfdb89703d3392ed45dc0aad7a9e

  • SHA256

    c7f6ad77097999788bc0a6342b20e793601a3fc0e1b2e837612c1e8857e4a56d

  • SHA512

    a1c3dcb70a0a36dc2f40963413fd962ad8fb16d890251bf2cab1c74c68de6aaba5f2285aba43c74f6b90d144545bef9da43f582bac6667c37734e77f38009924

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9KiX:V7Zf/FAxTWoJJ7TgiX

Malware Config

Signatures

  • Renames multiple (4658) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7f6ad77097999788bc0a6342b20e793601a3fc0e1b2e837612c1e8857e4a56dN.exe
    "C:\Users\Admin\AppData\Local\Temp\c7f6ad77097999788bc0a6342b20e793601a3fc0e1b2e837612c1e8857e4a56dN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1194130065-3471212556-1656947724-1000\desktop.ini.tmp

    Filesize

    54KB

    MD5

    ab444bc5d3c9582083aaca6ce625c464

    SHA1

    06329f12cb0dbd4a7375009f77c7609f71d805ef

    SHA256

    69b770c816eafd005572370e4c76291b443b3e9e272f3d8509e0821a2ad8751a

    SHA512

    205482b2d3de2932fc7fc8a4c031296c1cb3e5390a2b49a25e060cf76200422337f0c787473186d3fa5f38e54acb8dc65d772c4d22a67b954ff8e36e11f32c73

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    153KB

    MD5

    14b1df9b1da1c14a25f4c78198a98b53

    SHA1

    4d6d95429400d2e34512fcdcb3097a0018c825d6

    SHA256

    e6b72f9928cce8a1ce8d82dfe65bb8c2f55a513f19dd829523c84c081e1e243f

    SHA512

    e086a8cc2f94bdaaa753ebb7d5087551b9b61299ce0afa030d36443f60183c680c30b124a1ce54e82fc33ea90bb7a48e5a87b0f36a509330f2d899d445884eaf

  • memory/3292-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3292-964-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB