Analysis

  • max time kernel
    119s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/08/2024, 12:57

General

  • Target

    ed215f25429217a88a7eb2fd3823ea50N.exe

  • Size

    50KB

  • MD5

    ed215f25429217a88a7eb2fd3823ea50

  • SHA1

    44d33a73adf126c195565f5e218dc9c4c1db2fca

  • SHA256

    5652fa2647bc975bd29cba68fd06aab3f0d3ea95c7a838730a2f6bd7e107cff5

  • SHA512

    ebf7d51474c2ddaffe73e45b299a5f1d5c5126f5c358475c29a762457bb62be958acf50905bb0f1b528a95acd440d60ec9db88c2f6817e6da9b6fe3a23f5009b

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI953NIw3NIl:V7Zf/FAxTWoJJ7TH3NIw3NIl

Malware Config

Signatures

  • Renames multiple (4656) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed215f25429217a88a7eb2fd3823ea50N.exe
    "C:\Users\Admin\AppData\Local\Temp\ed215f25429217a88a7eb2fd3823ea50N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1194130065-3471212556-1656947724-1000\desktop.ini.tmp

    Filesize

    51KB

    MD5

    0882b863afcd7f41724c6231e8821117

    SHA1

    83de3fdc038a0330572a5e0522211aacaa4f461b

    SHA256

    dbc40738b5c56ef07308e23893ebbda50dfeb5759f9007f239fdcd116e59f9a7

    SHA512

    2e38175cad071f8566905b1b2d7cc9f6f2e9873139ae603dcc0e3f518ea02a4deadb4ce64c4aac140918fee9f3cffc92b218b48f11094097ca3072d06e6a63a0

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    149KB

    MD5

    4d90a2ff7ecd1f26b1d4c49d3bdeffa8

    SHA1

    1409b206592fb8fef4b2f257fbd8c2649ea475f7

    SHA256

    dce06263194bf909942964660f7f810d8d9dfe36e0435feafa69cc6e59cdc85f

    SHA512

    35d039bea75bb02f6765530a50a626a907bb68545abb8966b221c701a0c9e1321abdc663d51dbbdfbbc4575a9805206c43b132d34f63d55b1f79cdd65f508e10

  • memory/2624-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2624-878-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB