Analysis

  • max time kernel
    120s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-09-2024 16:08

General

  • Target

    d13a1fd1d83613eb5fd38e06183370f2642c4c8e4d988f7ae8848ae5c326e33cN.exe

  • Size

    33KB

  • MD5

    9e371774ac9d3966eafa5c300ce2b930

  • SHA1

    fd6dff5ea74da15219da551f0954527cccd027d5

  • SHA256

    d13a1fd1d83613eb5fd38e06183370f2642c4c8e4d988f7ae8848ae5c326e33c

  • SHA512

    0d3ceec2c955e0e88ce1ef7c1700673a3ab12d46733e40166d1f3ecdbf5ff7d2cfb8a778b9775f2743376b9b3e3937d73500f84f44a76c04299a308399e8bbdc

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9Ro+QOViJfo+QOViJFFO:CTW7JJ7TPU1

Malware Config

Signatures

  • Renames multiple (4623) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d13a1fd1d83613eb5fd38e06183370f2642c4c8e4d988f7ae8848ae5c326e33cN.exe
    "C:\Users\Admin\AppData\Local\Temp\d13a1fd1d83613eb5fd38e06183370f2642c4c8e4d988f7ae8848ae5c326e33cN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-945322488-2060912225-3527527000-1000\desktop.ini.tmp

    Filesize

    33KB

    MD5

    6a85509e2b7bc323ffbb4fbf02b625a4

    SHA1

    9b3960731cb8d51e444ad6b3690e5aa234d82832

    SHA256

    f7d536690445c027cbda388b3e098f8cfdef27564adf0db4291a01a8aada16f1

    SHA512

    4ec2979c4bd3c37f843b8918706ac5120a009397b293b99850a2d89f663b4844b365f8227a95c7119d699fd045438c4227f15949741789077f9f95996ff2fb43

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    132KB

    MD5

    dd910026e542374538f5fc0db0e31e4b

    SHA1

    2ce98b340fb3dc6e2b71c6b58629110dd71629e3

    SHA256

    39619e05348bda9fd1fcb9fbc460b7404a4aca8c51f07d0822268c885fe5bb85

    SHA512

    41cc5b262b602cb658e88a9ab6d217b80d94b5add3139a3861a52655df5b482060f9c51c3f26fb1b02b5e92640af7ee3b33a27da17388a62f924fa722612f40d

  • memory/4000-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4000-930-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB