Analysis

  • max time kernel
    120s
  • max time network
    117s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-10-2024 19:25

General

  • Target

    f86e2297f049a5edb1c99d19b1d6db1f7c8e7715bddeb0f2f3154f407171300dN.exe

  • Size

    54KB

  • MD5

    6560b5e28fec354dc624c788ee4e93e0

  • SHA1

    3f2e3b3a2e6d080cb9cce11d17ea1ea12ced5659

  • SHA256

    f86e2297f049a5edb1c99d19b1d6db1f7c8e7715bddeb0f2f3154f407171300d

  • SHA512

    22be93fa7ca14a834f8a4c5b49b715ea2a754ae7cb3c2f82d50bc7ff01bfbcf748888688f5d15a3ec5fb1aaac081daf4ee8964f166f674a47d7e1b3af5fc1301

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9AG4:V7Zf/FAxTWoJJ7TK

Malware Config

Signatures

  • Renames multiple (4644) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f86e2297f049a5edb1c99d19b1d6db1f7c8e7715bddeb0f2f3154f407171300dN.exe
    "C:\Users\Admin\AppData\Local\Temp\f86e2297f049a5edb1c99d19b1d6db1f7c8e7715bddeb0f2f3154f407171300dN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:32

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3227495264-2217614367-4027411560-1000\desktop.ini.tmp

    Filesize

    54KB

    MD5

    53e9da094833e4669ea698645bd02084

    SHA1

    7b23454d8bbb06576f3111006f0421a1e6e84ba3

    SHA256

    6977b67a16e90da66edce367a49f1fc1471b5a275451a42c0bae5d47659ed14c

    SHA512

    447119aeece93594521f934b9a5b0abcdc62a0532543eea4fa4dba0923b04e9887797beb8b4b024c018a6fe2f1e6479b6e9f0b4a7f228984dfca60b79d5f142a

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    153KB

    MD5

    c0e40b5859f7a7a2f4ef7d0bf81ba420

    SHA1

    2b52730ba2f36e710aff65455bec4e5dde0e1018

    SHA256

    cd56ecabe67b5908a1ad0cf5a829e0d30e1a928fb1509ea1bd18f4aa09edf674

    SHA512

    2ac24623c094d7271e5df53431d50e513b8529ebd391cb4dcdd9f88bdb1fe9f838da2c853f4fc8abacac4a41be85e9fdeec33eee8896cb2660b222b6c1b5105b

  • memory/32-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/32-700-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB