Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 03:06

General

  • Target

    eb86308d8318490f1a2195a8f06b926bd269ea9122feacd22d91370ae6b55114.exe

  • Size

    84KB

  • MD5

    7ca1081cac4702d6da26b25163ed722f

  • SHA1

    4ed8f91ee5f60feaaba21a649a81316e2745637b

  • SHA256

    eb86308d8318490f1a2195a8f06b926bd269ea9122feacd22d91370ae6b55114

  • SHA512

    d81f53bddb8b498c860e6d071c8e44284652db4454cc04ad59aeee25631ce19bfbc79fcfe70d4197236f2636ce4b171bc8ad2194d73adb257154231ae8660007

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9tBT37CPKKdJJ1EXBwzEm:V7Zf/FAxTWoJJ7TRTW7JJ7TDS6

Malware Config

Signatures

  • Renames multiple (5109) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb86308d8318490f1a2195a8f06b926bd269ea9122feacd22d91370ae6b55114.exe
    "C:\Users\Admin\AppData\Local\Temp\eb86308d8318490f1a2195a8f06b926bd269ea9122feacd22d91370ae6b55114.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2780

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1194130065-3471212556-1656947724-1000\desktop.ini.tmp

    Filesize

    85KB

    MD5

    8619eb348138851eb7a0e0a13a09f074

    SHA1

    055d406f668b8a4b709bc4ed6f243cbb92e1f665

    SHA256

    90cdf40ceae95a86bf70e33e4f664ddbb098cb912fb3e8397eef35b0fc4e04b5

    SHA512

    588b83b1bb28aa21a8f85a026310e6a734eb1c9e319a900a36e3f15713574d5d1db9803de1e8406050bbeddccc0c1455f540cda934bff405606c85290b5ed904

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    183KB

    MD5

    10ce08978d5d9c97d51cfc44cbcad1d4

    SHA1

    09187ebef314631d183f5e43b7acfbbb3652d017

    SHA256

    2b9f74cfdd879d7d7dfc51d3339fed82c033c45e377d32a8eef2054c7c000230

    SHA512

    65cc55d14d9382fd86a3377a5398d75e0dfc1014bb9060cfcd3561449e163ef0f60542aa8f8805b300133afa0f4e86aa1e6c1434582ac4ea15cd9200aa7aaeb0

  • memory/2780-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2780-902-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB