Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-08-2024 03:01

General

  • Target

    c9e6d0126551c606c7b1d851d67bf639e19cc7f778077cdc328893e7c65c1ae7.exe

  • Size

    56KB

  • MD5

    5d3fed6aec1e0d083f4ae26fa69a63e5

  • SHA1

    bf1a3a1f45fdc91dd09c2a741bc77bcc008d14ca

  • SHA256

    c9e6d0126551c606c7b1d851d67bf639e19cc7f778077cdc328893e7c65c1ae7

  • SHA512

    19bb562404c39b62d120c99bd168418a1ca5bf5a6f9e0b40b73975d608414f0603f323ea4c51b974eae45eb8226a9032f76183becb83a0f9124896748077d4d4

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjSEXBwzEXBw3sgQw58eGkz2rcuesgQw58eGkz2rR:V7Zf/FAxTWgGpGPwL

Malware Config

Signatures

  • Renames multiple (4842) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c9e6d0126551c606c7b1d851d67bf639e19cc7f778077cdc328893e7c65c1ae7.exe
    "C:\Users\Admin\AppData\Local\Temp\c9e6d0126551c606c7b1d851d67bf639e19cc7f778077cdc328893e7c65c1ae7.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2718105630-359604950-2820636825-1000\desktop.ini.tmp

    Filesize

    57KB

    MD5

    d67c18e71c2b076850cba2e04936b35c

    SHA1

    01389592aa1b0c0b780b3815c791181312d4260b

    SHA256

    96d869179865df31b3d9644653676dee8879d1cd8380a1c84e239ec9f2585b80

    SHA512

    09cdff2e9d21b379a0d082e835108e6d4d0b55f0b4cbbda6cdb39384110a6b921d4e9370efd640661efc1adc428f9104e12292150371983f05cb19be1005014d

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    155KB

    MD5

    d98df74100c8ddcc7ac72157d2c05b51

    SHA1

    34709c015b11ba947b545a3da2d6060b950d50bd

    SHA256

    cfd136da736fb1d2c6e93989395a78775adb951eced2bf42e6361c1d882dc301

    SHA512

    dc1e33e7f8ab94b0dfe4e4a3d1e44013c4f4aea61ee9acb7e599829a1505190ef2871eccea0f3872e9d44ada78f058adc62bc60d40bd73fa3838a9936e82aa15

  • memory/1548-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1548-1776-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB