Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 05:02

General

  • Target

    e6b970f4793e085982da191ed52a3da1da6edd25a1469de347cc82e58711e641.exe

  • Size

    109KB

  • MD5

    422dd92b09546ca60e8c9e118ed2c6b0

  • SHA1

    950597b4924c26d9b9a578dcd40d574da9433591

  • SHA256

    e6b970f4793e085982da191ed52a3da1da6edd25a1469de347cc82e58711e641

  • SHA512

    5543269d2fa0779c4708ad3e2f96739d4bbea920625a095202a2aa6a68689bd3c6d8984d2bbb5c7d58c00cbe75395a472529509847e627739cacc4d34d22f360

  • SSDEEP

    3072:fny1tE2tEtyKoIWbsHfySkT5GeCyi348oWGRPOzkjId6q8UdrSD+kCoIfL2YwqA0:KbEeEz

Malware Config

Signatures

  • Renames multiple (3708) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e6b970f4793e085982da191ed52a3da1da6edd25a1469de347cc82e58711e641.exe
    "C:\Users\Admin\AppData\Local\Temp\e6b970f4793e085982da191ed52a3da1da6edd25a1469de347cc82e58711e641.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2878641211-696417878-3864914810-1000\desktop.ini.tmp

    Filesize

    109KB

    MD5

    bfab8e8a3bbd061901568fb414d8c28c

    SHA1

    805e23e0548a89151bf5c96f7d9c2fd10e6c2132

    SHA256

    b5bc81e956250656f528180302b028ec3c50856f97a31eb5f0eab2814531806a

    SHA512

    53f6b148c50c4a6fa73e9fe74c03735fff2b16623c2861fb73a6dfdef5619d18bc10d5653106c3a409d68fded140402e2fb0077f42789d4d3449f8106f2d1e89

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    208KB

    MD5

    ec34e867b3acf9f65ca438a77e4b9edf

    SHA1

    578082eb50c40000f5da22376ca273dc25f285e5

    SHA256

    5e2e7bd7dedaca9dd941abf33fec5ebbc709f5d5b4a3e0ca20754d1d1f380cfb

    SHA512

    65e30f6988b90bd0c560a0127ee38e549af74b380c56e4f11104df897173f5136d971b0e213a72e4b05a8bbbd15bae2b4e4b99f269983cdfbb8a9a4b3b41e081

  • memory/2716-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2716-632-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB