Analysis

  • max time kernel
    120s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/09/2024, 14:37

General

  • Target

    9f3292ed52c0353857f3a78fd1cd635895fab67176131015c1bfacbddc33795aN.exe

  • Size

    104KB

  • MD5

    c3249a430026887f6ff7ddbf40a664e0

  • SHA1

    b806a4e8993531bd0d7b42f17e3bf907cc16a081

  • SHA256

    9f3292ed52c0353857f3a78fd1cd635895fab67176131015c1bfacbddc33795a

  • SHA512

    03bfda5ddf070ef9f0f3619f7bc34ac06e3886d7bf8e7bad458b0205d6a8c9ccd150fcd7e2509b439d5edb89a7b73cfbaa632a5223fff388aa972762c7c9f6c1

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcwBcCBcw/tio/tiFn4r7BTE:V7Zf/FAxTWoJJ7TTQoQcTW7JJ7TTQoQo

Malware Config

Signatures

  • Renames multiple (4393) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f3292ed52c0353857f3a78fd1cd635895fab67176131015c1bfacbddc33795aN.exe
    "C:\Users\Admin\AppData\Local\Temp\9f3292ed52c0353857f3a78fd1cd635895fab67176131015c1bfacbddc33795aN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-523280732-2327480845-3730041215-1000\desktop.ini.tmp

    Filesize

    104KB

    MD5

    bc1d4dd9611c9e8ffc08686f8db5011d

    SHA1

    f7168d9bf33fd7ce089b61e36802d97d3096642a

    SHA256

    2b5cb5c3e864b37ac84d1d90a1d5abccdc6ef41dbe178738d55999280d94fb6c

    SHA512

    0fd67c28e31205303c521a045d9ecb944b3b8135b52574994637883aa50656ff5401a6a4341f267abd0c0e2248f99ebeb05228b85a77b710abcdf989818dd3b7

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    203KB

    MD5

    b1195b8d855c7fc6118178530b40cfb3

    SHA1

    c07f003629fd85db840db30920e5132c643e0003

    SHA256

    4fda170e33509f8c5d6fce27bc61c3c8919fa1c866168bade63710054c818868

    SHA512

    fce6d3b0789eb0d8476c8b3e21aeee10f1ad521b2590706fedd41bc7d998e0a0d0a59fb631f907aa38b2fd48ba8afd269688644f157459a640c1c7652704154a

  • memory/1960-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1960-854-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB