Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-08-2024 15:17

General

  • Target

    ebc9f51ba1edcd8b8d72e11d086eb3b0N.exe

  • Size

    81KB

  • MD5

    ebc9f51ba1edcd8b8d72e11d086eb3b0

  • SHA1

    7499526e96b7e3a262226953be108a977c1bb919

  • SHA256

    ede4b9e1b7f2797b0d774ba24724a5e2e43fb04d632d0cd1c5a780b1f8f588a4

  • SHA512

    912d96e2309137e476c5bd31ec85363580ed2c489d34ec2b3582c40b4077b2d80f854b39e65a3f7eb2eb2a1299a639c96033185b962d42f27c442922dc17e8c1

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxY5L:fnyiQSox5L

Malware Config

Signatures

  • Renames multiple (4535) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ebc9f51ba1edcd8b8d72e11d086eb3b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\ebc9f51ba1edcd8b8d72e11d086eb3b0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4182098368-2521458979-3782681353-1000\desktop.ini.tmp

    Filesize

    81KB

    MD5

    0404842dd56d1a510d39aac0663dfd24

    SHA1

    9adb4f49c0b5d00fdee3243f9e144e1916ffee12

    SHA256

    5fe8f5fae2c4c1812b39a908e58694b88f3211cba66a8a86ebd5276e77d08f8f

    SHA512

    92b502b18a2684c3538cdfc8f2bd2da2de44ec2b7dccf9fe0c2db549335c7e39512c1f8df71b2b7a0711ca0228b7dc4d2ff6de56edd8bc7cbbc40140e5bb7d50

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    180KB

    MD5

    4c444a8057e90f9be6dee9781fae1e3c

    SHA1

    98e1b5e31c88253639973a2d84553158f2d8e3f1

    SHA256

    16d540fda28281102335bdde4266f40c64c3c3811da3927c82a5c624d4f98373

    SHA512

    6448aaf73689ccc425e8b82a2d420693f21834a33aa1af9bf2fca628df44268a0585d56a63c81a391634c6257726afdf16127ecef4d44a76661d533f1192374e

  • memory/1168-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1168-764-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB