Analysis

  • max time kernel
    150s
  • max time network
    117s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 02:55

General

  • Target

    e50c5588c9f78c38d326a32badc38cdb92d02ee86ff9aa9ca76c8662f339a019.exe

  • Size

    97KB

  • MD5

    3d2ec3652d96089b017b17c4c9d838aa

  • SHA1

    916ba6a565b60885f97412ed7ea0e21aba906873

  • SHA256

    e50c5588c9f78c38d326a32badc38cdb92d02ee86ff9aa9ca76c8662f339a019

  • SHA512

    2382170ef2ba1dcb331ca2810a859b9a7a615a4da523484a2bf8139fc51ea7fe8c7c33218c5093b1046ba3e83950a410fe80683b0f2b27d28d874d50f15ab765

  • SSDEEP

    3072:fnyiQSodYeHNmkDxfIyKoIWbsHfySkT5GeCyi348oWGRPOzkjId6q8UdrSD+kCoS:KiQSodYeHNmN

Malware Config

Signatures

  • Renames multiple (4852) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e50c5588c9f78c38d326a32badc38cdb92d02ee86ff9aa9ca76c8662f339a019.exe
    "C:\Users\Admin\AppData\Local\Temp\e50c5588c9f78c38d326a32badc38cdb92d02ee86ff9aa9ca76c8662f339a019.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:5080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2392887640-1187051047-2909758433-1000\desktop.ini.tmp

    Filesize

    97KB

    MD5

    bc4ee9dfc7308616675d2f5e3e11ab65

    SHA1

    3459298e4f0c8f419eb972a97b9f8289933acd7a

    SHA256

    b71db8c14019162e40a4ade40bc481f23184bd73d107683e746cfd078f5c4006

    SHA512

    bff94df83e730f074f32c0665a7ca3955cd1a03e82e094671335007a6ed19c7c02d391300c476553680499503d348ccacf37374c15e9acf93d51c8c855b9f9d0

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    196KB

    MD5

    a2325a0b610d1ab7259b100d6c4191d7

    SHA1

    b225067b0babf1e497e2ce527f403ed9a3fe00da

    SHA256

    7e8e70b55c236258b767bc1a54206bee2f6e5be416e32f729956575e5556bf11

    SHA512

    18a046112009f5b3df077ba2b78acb0dcc3fce72c3337f12fec06a32ef241a11db5194d68f321fc3d0caf0253dfc2c53db18d5e448c31002b912862a9fc8e7ed

  • memory/5080-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/5080-802-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB