Analysis

  • max time kernel
    150s
  • max time network
    52s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-04-2024 10:23

General

  • Target

    dd84809c765f876404d5aa34853847dc.exe

  • Size

    124KB

  • MD5

    dd84809c765f876404d5aa34853847dc

  • SHA1

    9c945c5ab506e66ef99a2399a322f71ef123658e

  • SHA256

    ef1b9aa243fe67f96a64f50929f24888bdf767cbf5ca7d8fa82bdf4febfece16

  • SHA512

    fbae94b7f9168cf12ab2735a151b4521e409c3be80448fccb0c4affb6437d189b574b08fc78ca70c7c323f8c1de6b28408a28f1364ef12c91913a79026295a67

  • SSDEEP

    768:/7BlpQpARFbh2UM/zX1vqX1v+1WbW1rjrA9ZONZOD5ZTXpFWJB:/7ZQpApUsKiX2

Score
9/10

Malware Config

Signatures

  • Renames multiple (4761) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dd84809c765f876404d5aa34853847dc.exe
    "C:\Users\Admin\AppData\Local\Temp\dd84809c765f876404d5aa34853847dc.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1356

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2818691465-3043947619-2475182763-1000\desktop.ini.tmp

    Filesize

    125KB

    MD5

    60722b39eaa9bcffe9dad0924efde281

    SHA1

    356f74a0f47288bb2beeb439e570ce924a069657

    SHA256

    b350d7bcd6e01a825b55f407836c990e180d6376e3c5eeb37d329e784075fd6b

    SHA512

    358d04f32a29bb81ae7e522058e283b3fd3076dd5f5d46f6f677cc88a9f10131b9a92d57571225a2811ca48c042d9da3aad793de0bb60b47fca900bc4587be2e

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    223KB

    MD5

    e6822d9f3f37e973966e12726e667fce

    SHA1

    ed70769247f209ad09ace096b7b4ea4d30450292

    SHA256

    a38974487f758af0e81985c9946de5aac0abf5398924d0a547ca219161c5dbc3

    SHA512

    1c03c7373cc10ec0f59ff10b2e107649d38c399d15d83343f71698d1c7ed4932a919411e58899ac6e038d5ce12c1a0b7aca7535fc2d1a6941293b39bc2dfae54

  • memory/1356-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1356-1734-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB