Analysis

  • max time kernel
    120s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-08-2024 22:38

General

  • Target

    e5fa5a5b34a0fe322ecbac602f62bd70N.exe

  • Size

    26KB

  • MD5

    e5fa5a5b34a0fe322ecbac602f62bd70

  • SHA1

    9f2681bc4d963286f76a77e9d87064652e1a4716

  • SHA256

    f70d9243f13c6895232385954048df2d90c0d9e1bf981f9cd41ea12f76dccb73

  • SHA512

    1e1747ec681d20b08640330e6451da39eb91c7207941898ee7f45378c7335bb31b9b5ae520f1c282d32099f18bc80b63e64dfdb7d304748a2fed8d5d93e5dfdf

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJ1Evd5BvhzaM9mSIEvd5BvhzaM9mSsxmMxm9+9O:kBT37CPKKdJJ1EXBwzEXBwdcMcI9O

Malware Config

Signatures

  • Renames multiple (4678) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e5fa5a5b34a0fe322ecbac602f62bd70N.exe
    "C:\Users\Admin\AppData\Local\Temp\e5fa5a5b34a0fe322ecbac602f62bd70N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2718105630-359604950-2820636825-1000\desktop.ini.tmp

    Filesize

    26KB

    MD5

    36ec6f838ce1ba2037d9ab84ff8a2f6f

    SHA1

    9caa71488421330deae68981ec7094e243eef8e6

    SHA256

    6f37f85741998c44b3c0aa3b168921fa8912872e35e1818ff79410c1eba93bea

    SHA512

    ab265255db793425a9ae530793f4ad7e3df84462be1d079e5dffe3c3f6af4bf51274b17440fc79a99194e32b08e1667e038e0da4f9d4695b2b093ac3de961134

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    125KB

    MD5

    3d29d7ae600cf39f5499694b37ff8c50

    SHA1

    f8c429f33cf2e82c12e36e76a9df3f79191553f3

    SHA256

    05aa2866a12eb118ad235b7f09c7e73150a77fdca556b26b798bcbeb4da4cb90

    SHA512

    efbea7cec75a92785fe594f3db63ddfce33f24de99bb1a315ca52bdbaab933a67b88ec27cef934972589d487173cfe8d5a51e0d6b6561f224075b76547f5af80

  • memory/2672-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2672-1021-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB