Analysis

  • max time kernel
    119s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-10-2024 04:50

General

  • Target

    f6963b62f236e16a6d1bf9daaa7537211bb1d062b1c224f166035c5e422758c6N.exe

  • Size

    28KB

  • MD5

    7e4923772386700691a222b732df5e40

  • SHA1

    62d00ee039f29ea20a9e5071c2257f6f0897dce1

  • SHA256

    f6963b62f236e16a6d1bf9daaa7537211bb1d062b1c224f166035c5e422758c6

  • SHA512

    b3532b972fe03deea9babe80bcac5cfb03dd45ffca8cfc634f97c13c9f81225b648b469d246b76132e525f95c118f88cc5b15af46892936692f05ea8bc1e699e

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9Y9ChuAhue:CTW7JJ7TxMAMe

Malware Config

Signatures

  • Renames multiple (4659) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6963b62f236e16a6d1bf9daaa7537211bb1d062b1c224f166035c5e422758c6N.exe
    "C:\Users\Admin\AppData\Local\Temp\f6963b62f236e16a6d1bf9daaa7537211bb1d062b1c224f166035c5e422758c6N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3756129449-3121373848-4276368241-1000\desktop.ini.tmp

    Filesize

    29KB

    MD5

    0d467a28ca15339eac38c0726aea81ca

    SHA1

    e38d6d313c2bf7d9a6a66bfd4d675255605b890b

    SHA256

    d352b1e5d1c24f710caae5518dd5087a2a9987911aecbb833c8a77843f12655e

    SHA512

    8f70ad77f3476d6c89a3aab42c1fcb9bdba9f36f8b53ae388401189fbe6d04f70bc77cf2c2e6fe510f89bcbeaf56ec88ac91f923f735b4903af64df59c62333a

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    127KB

    MD5

    93ac7ca74255e62f02aada3c279951ef

    SHA1

    1df9548455a5d2927851507729b4a90e1608e006

    SHA256

    c7e1ff9bd6f8251582f16f0e6892b20a12cb39806068d9f6ced946634a920e11

    SHA512

    98dd8f733182842828eb36451b49bcab712646c912cfb284b00a4c56ae259595bd95edc22418a89ab1da0a96132b41f2d9e51426ce79e96540e41ba8fa8fc62e

  • memory/4952-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4952-794-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB