Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 02:58

General

  • Target

    e7bd453d4a42d2c5ecdf5d7f7b997e7c84a50f83bd521e70a41a413b29c4bcbe.exe

  • Size

    81KB

  • MD5

    2415721f1d3e5f940aa1df2f51f8a372

  • SHA1

    8f095b2aac2beb62eb23d425179f861708b8c9ca

  • SHA256

    e7bd453d4a42d2c5ecdf5d7f7b997e7c84a50f83bd521e70a41a413b29c4bcbe

  • SHA512

    32ec82f6d00b9df27e1c1e1401c71ee95d4e1a04bde13859a8c615cbcd90191dc1416c48d9b93bd37c3f991451bfb4a671bd149b1b8dace8472914c8833f5610

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9+F/MF/iBT37CPKKdJJ1j:V7Zf/FAxTWoJJ7Ty2ATW7JJ7Ty29

Malware Config

Signatures

  • Renames multiple (5037) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e7bd453d4a42d2c5ecdf5d7f7b997e7c84a50f83bd521e70a41a413b29c4bcbe.exe
    "C:\Users\Admin\AppData\Local\Temp\e7bd453d4a42d2c5ecdf5d7f7b997e7c84a50f83bd521e70a41a413b29c4bcbe.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4412

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-656926755-4116854191-210765258-1000\desktop.ini.tmp

    Filesize

    81KB

    MD5

    6ba340bdbed15331795cc77946036e00

    SHA1

    17d12c7ab2fd49d61eb4e7ce993aaacddeb9d126

    SHA256

    c2fd24fb6092a6683a3089eba165862502c3b8d7265498c334cd356120581331

    SHA512

    03d97dc2dd35115588fedb7e4d4df40915bee6f3ed078527ebe299944c298a805be9d80bd41d60b3381992037daf32545ccc1e8c290c48f346e300ae8948be6b

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    180KB

    MD5

    2dbbe1659ccd7cdefa0f9fdb0f9f3739

    SHA1

    efda4493b4aa30a847c0f40a17e757c3fda83c25

    SHA256

    cee86961a3aff12381b065d5e4d649092e2a943380800a6f18705b00e666c95e

    SHA512

    47a824a9446d60c7c4ed3c2c9329f42aed13eb6e9d5d50b6821948b9813e5f42bf14e3a01d27e71595aaf84101fdde95d4568097c42f40c949d181185d70b3c3

  • memory/4412-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4412-858-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB