Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 23:21

General

  • Target

    74911b3b6185b63aee9adcc53b182c641b402b202c095388a15ea4b2fcbf228d.exe

  • Size

    42KB

  • MD5

    5277ff9c3801912c3cb9ecc2f9f940f1

  • SHA1

    4313bfde5b48e13d14f20f3110045c19c8869c76

  • SHA256

    74911b3b6185b63aee9adcc53b182c641b402b202c095388a15ea4b2fcbf228d

  • SHA512

    fa530cc9cc7606509b267e339d04fd13d518f5aff7ce185f25882bd4c789a44d78426a09614df9460f7896eac53229f197972c0a12a9412fcdf194f384f248dd

  • SSDEEP

    384:yBs7Br5xjL8AgA71FbhvgYJfPg7JDYJfPg7JF:/7BlpQpARFbhIYJIJDYJIJF

Score
9/10

Malware Config

Signatures

  • Renames multiple (5241) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\74911b3b6185b63aee9adcc53b182c641b402b202c095388a15ea4b2fcbf228d.exe
    "C:\Users\Admin\AppData\Local\Temp\74911b3b6185b63aee9adcc53b182c641b402b202c095388a15ea4b2fcbf228d.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3520

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3906287020-2915474608-1755617787-1000\desktop.ini.tmp
    Filesize

    42KB

    MD5

    87748f74eed8531e1da06aeb020e5448

    SHA1

    1a171546cbdd9919e2fb717bcb3db95975f09f23

    SHA256

    5bcd1d46c01876624653203578466e197d53fc040181eb526a706fbe2a02148f

    SHA512

    f20ac7d2e6d3789bbe89f1766f0be1ed0c9a3ffc27f06624ed47ef5d537a4294623e2855c0065defa7f6977ea6e188eae11cb71394143b19f0d83335c0804375

  • C:\Program Files\7-Zip\7-zip.dll.tmp
    Filesize

    141KB

    MD5

    37b56e8fb73dcb488fb9c8da2ac4cb06

    SHA1

    74d0729e2a6d2ca591a162ff6ffa516b9d2b4ffa

    SHA256

    7032106db1d710cba3e53d1db14008ecc0182dc1716dbe2679ed0f5cac52f240

    SHA512

    48acb623fec245797c5c2339db5e9ab9682a80cafe7644039e67d6dbbfa786688fa15aeda332911762ad7efb84b7b16df809f9a51dad468bf05c8d63a0fefa6f

  • memory/3520-0-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB