Analysis

  • max time kernel
    120s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/09/2024, 20:20

General

  • Target

    f427f2ffcbe92a6cff2c634ff9124d998d976577d58369ea5b5b5795a1b88ea3N.exe

  • Size

    84KB

  • MD5

    2d7ffd20328d921486e2e6f8801d9660

  • SHA1

    96b8905b948f58a0c3bf3320a49f46d40d63d2f5

  • SHA256

    f427f2ffcbe92a6cff2c634ff9124d998d976577d58369ea5b5b5795a1b88ea3

  • SHA512

    8af49e104efd56525949f2c8c48a2b467c07758ec4dd78bff1049de7f5ceeeff99a2a81cce8b49f747536a2fbb6359cc964031f589a5d94c0683280eaf69ccdd

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9ZJ3RhBT37CPKKdJJ1EXt:V7Zf/FAxTWoJJ7TzJNTW7JJ7TzJe

Malware Config

Signatures

  • Renames multiple (4364) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f427f2ffcbe92a6cff2c634ff9124d998d976577d58369ea5b5b5795a1b88ea3N.exe
    "C:\Users\Admin\AppData\Local\Temp\f427f2ffcbe92a6cff2c634ff9124d998d976577d58369ea5b5b5795a1b88ea3N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:8

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1302416131-1437503476-2806442725-1000\desktop.ini.tmp

    Filesize

    84KB

    MD5

    08da0c0a43609c78160346c94fa51428

    SHA1

    2d6427f6c0ab50bd314386a3f961d03411ee3aca

    SHA256

    d363ddd30e258e22fc42bc9d2e0da85831f23a50e32dd591df34a97cd9742e67

    SHA512

    c2a7d86c8a6a447962257c79f008b361e398e1189c2004e91cf3c5ff633709b520956ab1957b487a5c13255559c451a04b972d77405d38e041f5a53d4a6e0d79

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    183KB

    MD5

    63fb3e3cc420d07e4fedfa7a35d90512

    SHA1

    85d7e78fbd7130e4101c7511a4036f4e21a5da96

    SHA256

    895d2968da34d7493d11b950d512890f37dc59078bda12c98730c41a0d20c857

    SHA512

    3326396ec36e43fbc241558a7a722db534d16fc00b772f74b6fde7d6deedbc510b8d1c06aacce89dda882a593af139ddb1be0adebae3ef6fb66c8ddf49304150

  • memory/8-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/8-904-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB