Analysis

  • max time kernel
    149s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2024, 10:03

General

  • Target

    e14c498dd7f8708b5c15f54535c416223e9f09fed68de6dcda8aa081581084c0.exe

  • Size

    59KB

  • MD5

    994b1cdeb29e449788b8ed4922a3d821

  • SHA1

    b95d57ef68196ca73fea9b6341177f8808807891

  • SHA256

    e14c498dd7f8708b5c15f54535c416223e9f09fed68de6dcda8aa081581084c0

  • SHA512

    e9f573fe7459184f25e4c060aefa54669704d38a368741ea33044cc52268a5bdfe6857d17c7e4f4666321e8de1ad194d6b6628343f59bd03d6236d4de17e6d1a

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJcbQbf1Oti1JGBQOOiQJhATBHfBo8o3PV15Rd:V7Zf/FAxTWoJJZENTBHfiP3zemA6H

Malware Config

Signatures

  • Renames multiple (4674) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e14c498dd7f8708b5c15f54535c416223e9f09fed68de6dcda8aa081581084c0.exe
    "C:\Users\Admin\AppData\Local\Temp\e14c498dd7f8708b5c15f54535c416223e9f09fed68de6dcda8aa081581084c0.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-493223053-2004649691-1575712786-1000\desktop.ini.tmp

    Filesize

    60KB

    MD5

    554b80cd5b3ada0abf60189e2359e29b

    SHA1

    cac560fc68d617a04a91d1ef36cad9dac7500e1f

    SHA256

    420c449ace6c2a524a117e8828c0a7edea34acd2a5a63314c5dd2b1942fa6ac0

    SHA512

    969fe0ccb454ceb006bd1f554f7af8d301287341c3568b6f1eeb102897636d4d0403c05b686ffd39dd2958b2cb969c7265792aea7d064071c25bffe848910965

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    158KB

    MD5

    43a69653472e1be49f1cc6924fe86e57

    SHA1

    a3079fcdc3c47573bd053d40e93a54c0aa2c7bb6

    SHA256

    80f27c3ce0b8ac871ee32a0c476e72424b6d5e38df9534f55145b104868f9617

    SHA512

    929ada6a1663f463cf2876c07f83a6b0d7f7ecd612128907e342f972ee5bd4f75e3828bdcba57e3e3e09b0b61ec6d43850008321f9fd68dd0d0b3526e6d4200d

  • memory/3284-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3284-652-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB