Analysis

  • max time kernel
    120s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2024, 12:11

General

  • Target

    6608ba846eb6f3f73296968f03494d1aa67dc576df07a55cd9c53cc8c99a23f1N.exe

  • Size

    26KB

  • MD5

    1f0fdfde8f581e3ed831081ebb684a30

  • SHA1

    da9cef30893811f7df8da847d352fc295e3f7a53

  • SHA256

    6608ba846eb6f3f73296968f03494d1aa67dc576df07a55cd9c53cc8c99a23f1

  • SHA512

    d8649d3e0a1e3c5b1b950d53dd4bca3b659c2330b450fe7ad3b3f3ceecfd72c0fd2c54355938c5f5cca07010d1fe7c67101c33ab44be404584ef8718ead841a0

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJ1Evd5BvhzaM9mSIEvd5BvhzaM9mSsxmMxm9+95PFhlz:kBT37CPKKdJJ1EXBwzEXBwdcMcI9Jlz

Malware Config

Signatures

  • Renames multiple (4664) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6608ba846eb6f3f73296968f03494d1aa67dc576df07a55cd9c53cc8c99a23f1N.exe
    "C:\Users\Admin\AppData\Local\Temp\6608ba846eb6f3f73296968f03494d1aa67dc576df07a55cd9c53cc8c99a23f1N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-493223053-2004649691-1575712786-1000\desktop.ini.tmp

    Filesize

    26KB

    MD5

    064575c870b2013550f97a49b2782469

    SHA1

    280bc267ca70c47f9a1f914c97f384b5e184cbfd

    SHA256

    e47ecc4cd606bb57c0b21d495b800ee5f56d901c12862137bb8c9c58cbe35311

    SHA512

    1900876742ce172949c7627958e8a04f549fe0fdefb36105ed2ac96bdbf95b96da42f2b8b5043a054acc8ccd89d50f0038f1e76ed030d349cb3f2f92de6e7228

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    125KB

    MD5

    40ec4ca3fd54f8b3f6595aca66b7310c

    SHA1

    603eb1d22be97890b6f42e116f553e136fc431e7

    SHA256

    609261c280ab0a57ca21e96a5526baed244497fecbeaccf0a4067d149db7f6aa

    SHA512

    7abcdcb89519cf79f44e4d15fca7953d40c0f5cddebdbb8ed4f5b8593ae936ab2c7c472e5d8046656f9ec9da67b4a6e510371c1d3e5bdcc840f6d81bf7dec33c

  • memory/3404-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3404-791-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB