Analysis

  • max time kernel
    120s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 16:32

General

  • Target

    e5a0286191e077d7a40fd12c33146f9cabc3501fb43f7f713c1cee2b07d231deN.exe

  • Size

    52KB

  • MD5

    b435ba5846f5e78d3307769633c05960

  • SHA1

    9c9ba9b78dfc48eabde73a04cea4d1dd9afa80e9

  • SHA256

    e5a0286191e077d7a40fd12c33146f9cabc3501fb43f7f713c1cee2b07d231de

  • SHA512

    fe30c8ceab3343aefcdd502a6ef2b85e3d4e30a7b55759ab51ed65280f630543716882946ca59b48ac024bd1769efe41252a2153445f0fc46669770f4f97b095

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwdcMcI9uGeoGe/X:V7Zf/FAxTWoJJ7TkGeoGev

Malware Config

Signatures

  • Renames multiple (4635) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e5a0286191e077d7a40fd12c33146f9cabc3501fb43f7f713c1cee2b07d231deN.exe
    "C:\Users\Admin\AppData\Local\Temp\e5a0286191e077d7a40fd12c33146f9cabc3501fb43f7f713c1cee2b07d231deN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2629364133-3182087385-364449604-1000\desktop.ini.tmp

    Filesize

    52KB

    MD5

    01a9b157f81ba0b0b66f8a51aa93541d

    SHA1

    be3e3c508bbc51cd6b88e234022ed34e0ce6c8fc

    SHA256

    548954dbeb8a979ea22d20d66f5928c75e597e270096742038416cdc97f1a04d

    SHA512

    235fe4e49edf8c818b18aa04321319022584a0e8cc1d0efa221047d59f40ca3d5748380b666aed75d2dc350f3c466eed8f6f5f14d9e2663605f83a4e704b0841

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    151KB

    MD5

    7c4fdc1c536a2de9c2bdaa86f5545a5b

    SHA1

    149dc9e682a44d6dbfeb190e4d73366e6827dc0b

    SHA256

    8ae2fa93ab8aba5d40479f58188911e48bea008c87dee77c041f4af2644ca7de

    SHA512

    a686342453ba48cc08f5d2cf6e11a9e0a07a62f5776023574a9dc45e4018fe4f301b2ed83bcd9ef8800244208bed29a1ac2c487093ae7526e935fd64d5ecc76f

  • memory/1044-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1044-788-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB