Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/08/2024, 19:23

General

  • Target

    0e4363021ece48b8e3229f3a48945c242a4954f3b7c46ce3d93c8878d99f9e2c.exe

  • Size

    99KB

  • MD5

    31c6148d5252b26aee7add5b93594335

  • SHA1

    ed152359c05988bfd12f0dd16fd375215594729e

  • SHA256

    0e4363021ece48b8e3229f3a48945c242a4954f3b7c46ce3d93c8878d99f9e2c

  • SHA512

    b718b19c44647546fb6d2f4cf4e24719c42b6d3102121ad9f454251e8b773ae831bb5e8db8337a1d2743e94a470c450d8a5ec0a80f4070bd9d0fa54eba74bd5d

  • SSDEEP

    1536:V7Zf/FAxTWoJJZENTNyl2Sm0mdnA8TW7JJZENTNyl2Sm0mdnAaqqq+:fny1tE42rnytE42rnv

Malware Config

Signatures

  • Renames multiple (5018) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e4363021ece48b8e3229f3a48945c242a4954f3b7c46ce3d93c8878d99f9e2c.exe
    "C:\Users\Admin\AppData\Local\Temp\0e4363021ece48b8e3229f3a48945c242a4954f3b7c46ce3d93c8878d99f9e2c.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4428

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1302416131-1437503476-2806442725-1000\desktop.ini.tmp

    Filesize

    99KB

    MD5

    92e3166d2957d4d51f87fc2809e1724f

    SHA1

    d2f44a96c8542961454f50c11cbe0f2cc291912d

    SHA256

    f53283476a21b49bfa43e7c079e4bc28fd66aff9c136f7de81757dcf5ddb71e8

    SHA512

    08618b25fd4c7e28c9af04697747623874a8ade35e5874efbf61a3b69437e4e0926d12459aada223c2d7eaa1776a57eadcbb84a226f7c3ec0553b0a861b0926c

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    198KB

    MD5

    623d29685e4fcf0be759df81d91592f6

    SHA1

    2a6bfa47db5b7082e0730ba38745be5c76a87d99

    SHA256

    746c06fc65d8fcfec1f912b6688393308b72b464a1554bba3eb0e62eed40d27e

    SHA512

    9283a053184771f2f18baea1faa52953863e19945d901d03b01f569acc9a5485c5cd416f27fdecdabf0a32d77be9b950ef6b270284872e842db1ad2136470b13

  • memory/4428-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4428-792-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB