Analysis

  • max time kernel
    120s
  • max time network
    117s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/08/2024, 03:04

General

  • Target

    e2e03ff23254888f9cfce049d00210b0N.exe

  • Size

    169KB

  • MD5

    e2e03ff23254888f9cfce049d00210b0

  • SHA1

    b26587fca99425b02d405f176a3d3f7e6c4f163a

  • SHA256

    d4de936b19509d6f7df0dbdf6b8c11a120fa366079db130cbb5b03faec486df8

  • SHA512

    5671e422dfb125e21d5705e02b2d3e09b82efd6964da2691662869f148f5338fa469f1371597e65a719938f454f5e3bba3440c3e9e6b2ec3caf3aab240410f87

  • SSDEEP

    1536:a7ZyqaFAxTWH1++PJHJXA/OsIZfzc3/Q8zx3Y3hx+fsio5UxKzWZ64+A8C4bwy:enaypQSo6VEio5Ua4NO

Malware Config

Signatures

  • Renames multiple (4147) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e2e03ff23254888f9cfce049d00210b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\e2e03ff23254888f9cfce049d00210b0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4512

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2392887640-1187051047-2909758433-1000\desktop.ini.tmp

          Filesize

          169KB

          MD5

          e01e3cf6a802f560f2823b00b273bea3

          SHA1

          28d81ebc12d9b911ebbda3687532fad6e1f0affa

          SHA256

          c475321e0dbcbb25cba7aa2f31c39993536cf746f426ff7d42cd1ff531ad28d1

          SHA512

          3ae5c2bc7e514fa8b0b6d634ac8056769bb4cebb52e2c4d9789437f1aefce3bbabaa48f75d4658a80192b763efe35b04489d2b26909e892bcf4c194bc91c4826

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          268KB

          MD5

          8161916f1fd8a7a5a9bf8f05c1f0df41

          SHA1

          9aacf1d02c6e01dafff58db385a236661347ec0f

          SHA256

          b771dd5db24004236c18bfcd2bc99e8ba1ef0dac3a847d4843e0afdc3316b7a1

          SHA512

          2f16c01d05130401766e714bbc1489c9d977529742b3fabfc524e3352f6ff3bf1a0c072c0b12f7feae5eadca2fb7d8974f54ee350b9b011508219d42706f2fdc

        • memory/4512-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/4512-766-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB