Analysis

  • max time kernel
    149s
  • max time network
    49s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/07/2024, 22:22

General

  • Target

    1cdec23ac9cf9e9ee5fb1eb76cdfcf20N.exe

  • Size

    83KB

  • MD5

    1cdec23ac9cf9e9ee5fb1eb76cdfcf20

  • SHA1

    f9aa71561301b7929a71766820ecc97d78b3de51

  • SHA256

    976751931b965dab356c4e39c6d17d599dbfa74d35918c6be45ad36126ea2f83

  • SHA512

    5652a946db937b8aca9d973f9b2ecb6b981dc1c9a93fd462aad61e018987a9c07c3db8016e006da7e20bd785394404acd2b856ba5cdf7f5519f154daf348dd6e

  • SSDEEP

    768:/7BlpQpARFbhWGUKBb4JxobNH3bG3bnEXBwzEXBwi:/7ZQpAp+KBpbNX4S

Score
9/10

Malware Config

Signatures

  • Renames multiple (5183) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1cdec23ac9cf9e9ee5fb1eb76cdfcf20N.exe
    "C:\Users\Admin\AppData\Local\Temp\1cdec23ac9cf9e9ee5fb1eb76cdfcf20N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3740

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2539840389-1261165778-1087677076-1000\desktop.ini.tmp

    Filesize

    83KB

    MD5

    553f64a343691b89550935fffc6448fd

    SHA1

    f78e12718e674697bd9ff8717efd5125788ebba9

    SHA256

    c4950837666cc89064e249e98f31b069cdeb73ffd9fd663d9a3e9d87caed80e1

    SHA512

    bc58226dbaff5f334d6406bedd6bdee7bb7c9ff47dd1d1e3355a9fb5f97bb12c3e95b7282189202c4d7a192feab7bca813c0e34c582888b299dc451af8c68369

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    182KB

    MD5

    31668df3d13b5c8b9d064a470e8ace88

    SHA1

    f2344334939edc0481065029eeadb9b9bb074143

    SHA256

    3f617f3e36188ee9572f6bcd63e20025bedf4f08535ca69a8ca873b5ca0a5ed3

    SHA512

    f290e759aeb4be9d70a6a3e03d741aa47531eacef194e83ecedcfa27f7d0c46bd02d958d4edc36521b2f1c18834154d5f086578cc33d2098aea88e45ecf45730

  • memory/3740-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB