Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-08-2024 04:47

General

  • Target

    ec6bac424b6f881860688884e4478216536f1720226f91f5f8a60403239759f0.exe

  • Size

    37KB

  • MD5

    36f5fe9bfe7e7032efe57e08a0b7637f

  • SHA1

    b5241e7bef7ee5c1d9a8cb387b3b22bc16729ec6

  • SHA256

    ec6bac424b6f881860688884e4478216536f1720226f91f5f8a60403239759f0

  • SHA512

    1872e1c53558bead122a43a0e40be3c88937c42973d983fb8b38d09ca78e43b7b45ede4194ce639547a542f915df3049ebc970ae70edd4ebef33bf1093666ace

  • SSDEEP

    768:kBT37CPKKdJJ1EXBwzEXBwdcMcI9NCQy5vhgCy5vhgw3N:CTW7JJ7Tugtgw3N

Malware Config

Signatures

  • Renames multiple (5279) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec6bac424b6f881860688884e4478216536f1720226f91f5f8a60403239759f0.exe
    "C:\Users\Admin\AppData\Local\Temp\ec6bac424b6f881860688884e4478216536f1720226f91f5f8a60403239759f0.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1302416131-1437503476-2806442725-1000\desktop.ini.tmp

    Filesize

    37KB

    MD5

    f7319e2dec0ed843b8f52b9ffe8bb6b1

    SHA1

    2f210509dcc3c309d3a9fdeb4dbc049752c8d6d4

    SHA256

    34fd5a80a7a4331fa431cef26a269e82842d5067ae91d6b8cc0726b7bec429a4

    SHA512

    8f70ec5ad55c77a0c0507cdd30ea8720c8a53eb9ec5b20b617c7a17cb864ac0b17e77d30447de52047ac4e3f887adf4dc35c99af044898422a995ae983e96d6b

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    136KB

    MD5

    ac080b13c027c807de76121b242f9a06

    SHA1

    7cbd44e4257db4beb1155c740828643e72941e3b

    SHA256

    48a801cb797d3792a977b61d312a3098d617d589a89fc3b2940264e6e588d9d0

    SHA512

    7dc54dda31192bc8b21c9dfbb93380e8cb72038ca6407dad9765ac528ac003c407406a3d37601c369bee45327c378fe1774d4bfab6dd2a53bb0f5afa33429335

  • memory/2040-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2040-1029-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB