Analysis

  • max time kernel
    150s
  • max time network
    57s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-04-2024 10:24

General

  • Target

    547b0ba0c2c7e868a6a0d48728c977e3.exe

  • Size

    124KB

  • MD5

    547b0ba0c2c7e868a6a0d48728c977e3

  • SHA1

    43c7fdd1aa9d60d8e4fe1b02aa1f96f12c9c20cf

  • SHA256

    b5b187cbe91105f49974e914b58bcce30defa917e6b2a535a52e37cb3652d6a5

  • SHA512

    70f0c60dccfc73aea9cabaf6eed6ea4beecab2bf422cf739b159e43d9edc2bcbd99959c647cc3678332f1d4158ba28b09c4644dabf95ef3425136f3c5af54456

  • SSDEEP

    768:/7BlpQpARFbh2UM/zX1vqX1v+1WbW1rjrA9ZONZOD5ZTXpFWJq:/7ZQpApUsKiXp

Score
9/10

Malware Config

Signatures

  • Renames multiple (4805) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\547b0ba0c2c7e868a6a0d48728c977e3.exe
    "C:\Users\Admin\AppData\Local\Temp\547b0ba0c2c7e868a6a0d48728c977e3.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3660

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2818691465-3043947619-2475182763-1000\desktop.ini.tmp

    Filesize

    124KB

    MD5

    581d637de5be8d6eaa843a1784a33a5c

    SHA1

    04bfaa38d209f8ffb8693a7dbea4bd8bd9867375

    SHA256

    def2c41eb634156ad6724de760ebe6aaad715c0c370bac90bcce02c61c651ac0

    SHA512

    4cce594934721808676734f1f5ce8189011941c5b709e9d85f6ba5d7e2b016484da11dcb46442d7756c3b5f3e3ab4f572bd71deef8606e9845e69eaa3a7959da

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    223KB

    MD5

    61e6173c1518b90f066b2d5d7a38fe67

    SHA1

    8d7ec53a49285dbc52f37cd8912cb4bebb25c7e2

    SHA256

    3d8e47568ac6f91f6eca779ab1425e11f98ceeac8583b1842deddd131d057430

    SHA512

    e92e2e9715e3b63a1273352e2afb18e3f90bda6bbad0f9eeda05517279d00897c8a0e639b093d4c401133cfeb0bc02d81e66c4e28d8fb583751f93d2d78a3325

  • memory/3660-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3660-1638-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB