Analysis

  • max time kernel
    120s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/10/2024, 14:42

General

  • Target

    bf8a06391699c7b46942d6e5ea765ad2f7eda1e68256e9f4e1daa9a9feb22f05N.exe

  • Size

    33KB

  • MD5

    63dc08e48f6e8051607f0df34cec26e0

  • SHA1

    5679b2b0aed77a167a763d9069d249aa0fb8925d

  • SHA256

    bf8a06391699c7b46942d6e5ea765ad2f7eda1e68256e9f4e1daa9a9feb22f05

  • SHA512

    ff2b1a468d4a74ea09788e82d341341954b603ded3ca6e4cf6c02b841ba889d2a301ffba31e50dd4cac49f3cea94e4e3885f6c521c921f06ce949bf7a03678a1

  • SSDEEP

    768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATBHfBo8o3PwqAJyqAJl:CTW7JJZENTBHfiPl

Malware Config

Signatures

  • Renames multiple (4665) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bf8a06391699c7b46942d6e5ea765ad2f7eda1e68256e9f4e1daa9a9feb22f05N.exe
    "C:\Users\Admin\AppData\Local\Temp\bf8a06391699c7b46942d6e5ea765ad2f7eda1e68256e9f4e1daa9a9feb22f05N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1292

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2437139445-1151884604-3026847218-1000\desktop.ini.tmp

          Filesize

          33KB

          MD5

          44d186bd3a0f6b31c82ddfd095743ae7

          SHA1

          c74b23dc65fb391a5fdfc3e08257d521781aae23

          SHA256

          ddf0a82c11a35da9557de4d1699693170c6d853bbe057f7a03281a8521fc933e

          SHA512

          e26991af2d7d9ce290e63b0929bb0ac827b6a46dd515b8474fb8d4d3d9f472e8535430c662403a13c43982d8c34b315962cdbf0fce747af355eb49b512d22f92

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          132KB

          MD5

          3299d516b7427b231cd40f04b7e33d16

          SHA1

          2ec98d27712b9e5f85985170771163b252408058

          SHA256

          0689db483727005231653a2697dad3cf914c4f85b362af88576cd68d68110667

          SHA512

          8854fef5749de6eedebb64afc95f8d4f3497e5f7287a08df846e49dad0e12fa46821c03ec607187e646bd72a4f63a7c8a7340f134e89e7aff326e62476d9dc2e

        • memory/1292-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/1292-787-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB