Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 02:56

General

  • Target

    e636d5e5fb6d62b7dce5bde6a6076ec000504e43ff9a577a58917efb13f389ab.exe

  • Size

    24KB

  • MD5

    70d56fd1d4dc1921869af0faec886c20

  • SHA1

    77913c2048aba8001d56ca586be4a47194c4df7d

  • SHA256

    e636d5e5fb6d62b7dce5bde6a6076ec000504e43ff9a577a58917efb13f389ab

  • SHA512

    004c65c2956206e7e9eae7f9db98f194a6e4b962832b60549b07269e683df103ac7424f6c0f8f0100a352a2a9b9c38af60d8ca7c8c97149ad5a08d889be22c89

  • SSDEEP

    384:QOlIBXDaU7CPKK0TIhfJJ1Evd5BvhzaM9mSIEvd5BvhzaM9mSsxmMxm9+9qQn:kBT37CPKKdJJ1EXBwzEXBwdcMcI9p

Malware Config

Signatures

  • Renames multiple (5281) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e636d5e5fb6d62b7dce5bde6a6076ec000504e43ff9a577a58917efb13f389ab.exe
    "C:\Users\Admin\AppData\Local\Temp\e636d5e5fb6d62b7dce5bde6a6076ec000504e43ff9a577a58917efb13f389ab.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1194130065-3471212556-1656947724-1000\desktop.ini.tmp

    Filesize

    25KB

    MD5

    b4ccfb5b04bcada8c037d406a10266c7

    SHA1

    3b0a935dffbe1b9290f5d688d2630cb8dcc5bfa2

    SHA256

    61817c4046b0ca3374524aebbb2d1912647cbe6db48a5f4d8ffb04a39ec27aaa

    SHA512

    062d95836376abd96d46c3a5f57f37ad5f7e3337e7b3e25df82c261ea572c3c77d26e8eb5d5ac2c7b8f1b15dc126bb692b250db2c06c62d236aff9b420a3d706

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    123KB

    MD5

    1f8c861b45dd316e77c72db3e0f13ec0

    SHA1

    007dac09192994caef0cd6d8e32658f2edb16d6c

    SHA256

    3b075570648096aaa08f205618c94df5f97d7f2d8332d5b4ac98fcfe15eebd10

    SHA512

    33347e8b62c6ae5b16641a013c79474876985eeb06b422a864bd50431ca490cd120a24e265058128585a95239947f3f747e2ec1ac504829768c465a7fa7735d5

  • memory/3140-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3140-1015-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB