Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-08-2024 04:21

General

  • Target

    e6d742caae25ae7c6896ea123f80e371a0bc6bed1165fd48775c595313a931c7.exe

  • Size

    56KB

  • MD5

    3ac8475403bd96bad85ac9f6d40ef24f

  • SHA1

    f6557785c6305e5679d31a82a995b61fcca455ff

  • SHA256

    e6d742caae25ae7c6896ea123f80e371a0bc6bed1165fd48775c595313a931c7

  • SHA512

    014f76d1a67228ada2dc9efd37e07239459bf1c1858131ecfdc8586373e79319221f7824b214a8a81bd47731496c98b8fa44d18a18828ff73da8c8c47df09c5b

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9RJD0x1E6:V7Zf/FAxTWoJJ7TtD0/

Malware Config

Signatures

  • Renames multiple (5199) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e6d742caae25ae7c6896ea123f80e371a0bc6bed1165fd48775c595313a931c7.exe
    "C:\Users\Admin\AppData\Local\Temp\e6d742caae25ae7c6896ea123f80e371a0bc6bed1165fd48775c595313a931c7.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-786284298-625481688-3210388970-1000\desktop.ini.tmp

    Filesize

    56KB

    MD5

    d8fb2049e2751fc9e2a412acc7e80a2a

    SHA1

    faa8359cf1ff152882c17c2e0a1454e3bd23ae46

    SHA256

    eaaa909cc1f6493501de9105ff462730a459b48ac5d799e31ec9c76747cd7389

    SHA512

    87d183cd0a928b43dee01a40f5b54cec314de24f91247550195b5db82c45291f1b907a82619bd35a13520653534775d0ba9fda0928b3d9a297e058900e738e13

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    155KB

    MD5

    75f7ff6b9d446b52ac6ebe3e4caebf65

    SHA1

    fdeb3b9c2fc7a6d6f7ac03fd767b1dba6b2a8669

    SHA256

    44eb4c797fa079bd7c3c04f13f499ffb6fa68c5e7d207dc4a4258a4ca7376569

    SHA512

    a370aed18217c2c6064a9be5ffb72f953bd935d3c9d908e244f2a55769de43d9fc1753bcd42668dc768f4a428566f0723f6b220d11a76a5406f18549a622fadf

  • memory/1216-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1216-969-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB