Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-04-2024 05:06

General

  • Target

    f21f935e92c183b382b829494a21c59043646499c7f66d01b761565802a25e3d.exe

  • Size

    156KB

  • MD5

    1b034aeeaadfd620be1ef0767d553c20

  • SHA1

    46bd42345ebeab4178c7d4dee17943b5d9161b88

  • SHA256

    f21f935e92c183b382b829494a21c59043646499c7f66d01b761565802a25e3d

  • SHA512

    d7971352ce65c71d4698f6c05754471a47841592786cdead31d3b406255f99de322b412b01e96991808b32216d860c0aba9be3b45dd9b0d7ffd0985eeb50d436

  • SSDEEP

    1536:/7ZQpApUsKiXBvzwvzXJvlwJvlH9/GTyH4xqN:9QWpngTJdwJdxtN

Score
9/10

Malware Config

Signatures

  • Renames multiple (4837) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f21f935e92c183b382b829494a21c59043646499c7f66d01b761565802a25e3d.exe
    "C:\Users\Admin\AppData\Local\Temp\f21f935e92c183b382b829494a21c59043646499c7f66d01b761565802a25e3d.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2312

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-259785868-298165991-4178590326-1000\desktop.ini.tmp
    Filesize

    156KB

    MD5

    148b38d167325c9cada9115f1259dc1a

    SHA1

    f3672fe2e046816f8096873bab0c4d0fe700c98a

    SHA256

    523f06d0718239ebaf953bc6b502ea3e23263170f0114a42c71a0b8724bcda7e

    SHA512

    3c4f021f2324c5517a933e225866928f8aa95be9173fd9d6b74af4cea5a4f72cdc50dc028662d3e3a5aea4c61529d85ef552fdc31904912821517d9659ccd3d3

  • C:\Program Files\7-Zip\7-zip.dll.exe
    Filesize

    255KB

    MD5

    2cfdea9bbdad1b94371a9042a5618342

    SHA1

    e6d510da49082fccb88580911346aaeec87d8acb

    SHA256

    d8bd1184203da2d27b2b159ab0c40849ab2fe31a3ed52f4edc5ab651dfb22897

    SHA512

    381c736c2adfce482170f7c3105190d5544719a1a7dddf52f3258eb4390295c660b20bffde852a978eed117080d90a0600a627048ed57bd09b930ecf9a9efcac

  • memory/2312-0-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2312-1742-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB