Analysis

  • max time kernel
    120s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 18:51

General

  • Target

    6cdeb54dc7b705e34d587827440f73b2f5c6e9b04c642e9857e651bfcf7549b7.exe

  • Size

    124KB

  • MD5

    537a6a752995846cb063f20bc44bfa09

  • SHA1

    dbfa26e789cb44dd0e9b035accb34c583c93bbdc

  • SHA256

    6cdeb54dc7b705e34d587827440f73b2f5c6e9b04c642e9857e651bfcf7549b7

  • SHA512

    6e90af2e5dcfc7751e6ca534cc4ae7c0171b93324c130bfb7cb11fbab9c5eb5a13a2e5ca1d6bb38fc46a2c56d76c2adbafa65218ce5cf5102ae4c960b722cdb1

  • SSDEEP

    3072:fny1tEC9iMGfUSaOy9SnJUwFU+FUhFUeFUXFUqyqKRrpF6Pw1:KbEC9iMGsSaOyig

Malware Config

Signatures

  • Renames multiple (3463) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6cdeb54dc7b705e34d587827440f73b2f5c6e9b04c642e9857e651bfcf7549b7.exe
    "C:\Users\Admin\AppData\Local\Temp\6cdeb54dc7b705e34d587827440f73b2f5c6e9b04c642e9857e651bfcf7549b7.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4089630652-1596403869-279772308-1000\desktop.ini.tmp

    Filesize

    124KB

    MD5

    f227ab5f6e6c944c4482ad98216ca3fc

    SHA1

    b78358761e49b7cb01dcc105def4d757c61a4ea1

    SHA256

    a80fa3094fe0e3527a423d1bd15d2035cace63df2c326e8a4541ed6ac89d7e60

    SHA512

    e2fe61a6fae952e9fd28bf4f05bd260133e9783ec3efcc65f09e3a6369fcc55de03b5789b1a0ba7fb34ba8f5e9dca802e5277c6a7089065a8e6b703177cf7e48

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    223KB

    MD5

    345045130b8208f60d05f322be942b9d

    SHA1

    03be319a3ad406a52239a22a252b611f3a015ea3

    SHA256

    ac1d0c5b0b061d1a67887cba6bf6e3006919a5b17bc84d8918bb77518a9a52e9

    SHA512

    b7d31b6181c510dec535111ff72024e82bbff9612bfb8a16a78971d2a5745c338d91dd7a769340ebad3080165ed8def51a1ab9dfeea26933bd08b3c102774eaa

  • memory/3048-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3048-642-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB