Analysis

  • max time kernel
    120s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/07/2024, 00:37

General

  • Target

    2ad2c2ad4abee901df8ec84e35cd43b0N.exe

  • Size

    71KB

  • MD5

    2ad2c2ad4abee901df8ec84e35cd43b0

  • SHA1

    164a797aa634c32512765e88c6053479ce91a20d

  • SHA256

    db19481544f2a77a6b184c8ffa2ea729cafb0fe905b32836ef8ebfc10a170a9c

  • SHA512

    63450e2f053ca9bf0fd24b4c0aa28942c4d092f84c9a20e95f383dfafc03cc5c77fad8aef8b89733f75a63ec7de0bd27f2956d20e6a6039733f4aa42bae10536

  • SSDEEP

    1536:/7ZQpApze+eJfFpsJOfFpsJeFrxFrTPG0PGN:9QWpze+eJfFpsJOfFpsJ0rDrTPxPW

Score
9/10

Malware Config

Signatures

  • Renames multiple (4424) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ad2c2ad4abee901df8ec84e35cd43b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\2ad2c2ad4abee901df8ec84e35cd43b0N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:748

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1176886754-713327781-2233697964-1000\desktop.ini.tmp

    Filesize

    72KB

    MD5

    e4a71d99461a1ed956fe9a14eb3b4761

    SHA1

    a696d3ab885849933d97aa7aa3ec0b8380a851c8

    SHA256

    99e826b50ef3d21ae8e70910b122140480c722e25dcfa5d436a1be54ffd7dd7d

    SHA512

    b1a9426515c4b80578f32ef697e7f13d4b8b05ba2a79c2cfc83eb03e8a8fc68bec19da5ccec12ab691d57fb8df7108727b68191b5f5d7f2031f01ad60abeb57a

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    170KB

    MD5

    092f915170251c1c52b1de5b017a6f83

    SHA1

    0cfbee69b5d6478a9e3854cc36e899bd68e8ff8a

    SHA256

    65cc2cd031447310a75c641cf4a804669512a1b429e4d5a442c33cf2bfdb5850

    SHA512

    8b0adc05d83f80530436948d7d185f793629b6d5fec9c9011bb3f2b1ad054930dcb5a015acaed983866553a38f0e17a978c1ed5cff8e02bf5b3631fbc854997c

  • memory/748-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/748-1796-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB