Analysis

  • max time kernel
    120s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/09/2024, 23:33

General

  • Target

    cbd27563ae03642671929fbc6d7bf3a7c86a7849a89973b3c16f2d93d7b887edN.exe

  • Size

    48KB

  • MD5

    f183198fcb18122d95c9a768e37c9ca0

  • SHA1

    819a48fbbcc8f3b4c3bd7cddcad0fb1e97cc8939

  • SHA256

    cbd27563ae03642671929fbc6d7bf3a7c86a7849a89973b3c16f2d93d7b887ed

  • SHA512

    1e67d99c5831d2bc79f9ab53c111d49d40c47012d18ddc57bdac288fbe84cea7dc84cef470bc289a7495592618d3d4ee381083d48e2735d8229ea14474b9813f

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9t:V7Zf/FAxTWoJJ7TX

Malware Config

Signatures

  • Renames multiple (4657) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cbd27563ae03642671929fbc6d7bf3a7c86a7849a89973b3c16f2d93d7b887edN.exe
    "C:\Users\Admin\AppData\Local\Temp\cbd27563ae03642671929fbc6d7bf3a7c86a7849a89973b3c16f2d93d7b887edN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4120

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-523280732-2327480845-3730041215-1000\desktop.ini.tmp

          Filesize

          48KB

          MD5

          c140e9ecdcd227a84afa4e2148674149

          SHA1

          248d2535561bc00a302300ce91edab92f9b9f0bd

          SHA256

          58d88491dd5186579a85421570c9432ffdb1d82a26c3e56a81f6c64f86f7bf03

          SHA512

          76044e0dbfef054ae371136632b2b1c17cde2a1730123161805e5985eb5603651615572afe4d4df38231f6541d6f0bedd21e9aec4217936ff1fd9542e05e7c19

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          147KB

          MD5

          bef0d66ddc2da176d78ccf515c4adc85

          SHA1

          8897170e28379e2dd3d6d0e7b996244e9ab419ac

          SHA256

          2f08df6a3e01e95f46626f396911cdb9f2020b0c4afefebed705de5db256d600

          SHA512

          455534473d9249c3223391550e5c68fa56a39af807e3c0d6dee7d099927bba706b820d0c695ea9341ae782cfed9b4ec58a792d4b252f059ed3617c3db43b839b

        • memory/4120-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/4120-942-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB