Analysis

  • max time kernel
    149s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 05:23

General

  • Target

    e6b970f4793e085982da191ed52a3da1da6edd25a1469de347cc82e58711e641.exe

  • Size

    109KB

  • MD5

    422dd92b09546ca60e8c9e118ed2c6b0

  • SHA1

    950597b4924c26d9b9a578dcd40d574da9433591

  • SHA256

    e6b970f4793e085982da191ed52a3da1da6edd25a1469de347cc82e58711e641

  • SHA512

    5543269d2fa0779c4708ad3e2f96739d4bbea920625a095202a2aa6a68689bd3c6d8984d2bbb5c7d58c00cbe75395a472529509847e627739cacc4d34d22f360

  • SSDEEP

    3072:fny1tE2tEtyKoIWbsHfySkT5GeCyi348oWGRPOzkjId6q8UdrSD+kCoIfL2YwqA0:KbEeEz

Malware Config

Signatures

  • Renames multiple (4615) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e6b970f4793e085982da191ed52a3da1da6edd25a1469de347cc82e58711e641.exe
    "C:\Users\Admin\AppData\Local\Temp\e6b970f4793e085982da191ed52a3da1da6edd25a1469de347cc82e58711e641.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4089630652-1596403869-279772308-1000\desktop.ini.tmp

    Filesize

    109KB

    MD5

    3a4bceec95a65b84bcc13277056af3ce

    SHA1

    4b401a9cf698bf5bc8dabe0e9e442f2629dec56e

    SHA256

    c05a703552537af27c6f8b78c9a903e374456fa577598562d1f4b9b39985c120

    SHA512

    6c5b581282f499f82306e98c65e663a3eda102c2eec021653b7826b4d7881e075a4f3ca1f7610674e48d5e44c61d31ae0d53458e1eec979cd6ec44eaf8f2540c

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    208KB

    MD5

    f533bc62973cc01ee5cc15348d97c78f

    SHA1

    7a93d8d788e4016aa736e09beb2a5db4857309bf

    SHA256

    985505999c7db027fc4104f9b885583c733afaabd0b78885f8beaeef1fa82136

    SHA512

    061ea3607248220787d9af6ba57a34ec616fd423783df469be3abb7dcb4d5d1fabbc9a4f49aa155d778eb10db07e752004a0f2a883814e13e6223cd30074555e

  • memory/232-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/232-620-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB