Analysis

  • max time kernel
    120s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/07/2024, 10:26

General

  • Target

    9c45adaeb2f20f65dda009397538caf0N.exe

  • Size

    36KB

  • MD5

    9c45adaeb2f20f65dda009397538caf0

  • SHA1

    0691470c71a56167e054ec939eae9eca5a31cca7

  • SHA256

    d56cc48d3d589fb19069ec68c20864010c228e84e9e21f99876f033909c30245

  • SHA512

    007739f81ccf6cdf69e047a11bdf3127650c4f4c19b68d4fd6c3893f376cded6b5946a3202c403105e3bf6f76cbd3f31c91e562cd46f17c1680a7dae41a45efe

  • SSDEEP

    768:/7BlpQpARFbhVqAJx5qAJx4foc5+OiJhx:/7ZQpApu4

Score
9/10

Malware Config

Signatures

  • Renames multiple (4613) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9c45adaeb2f20f65dda009397538caf0N.exe
    "C:\Users\Admin\AppData\Local\Temp\9c45adaeb2f20f65dda009397538caf0N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3716

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-384068567-2943195810-3631207890-1000\desktop.ini.tmp

    Filesize

    37KB

    MD5

    abed0cd3df7e15ee91c2c845af5086b3

    SHA1

    c587f4a46fa28b617d22b30896b2d2295d555f2a

    SHA256

    82ae75483b2d1ae011b9819bb0e0f5ab4db96bf6a5479fc3d12d614a0feacf13

    SHA512

    876892b1ef11ee376abb7d9f3ef6c1203867488bec059ba8d9e2d81052a110bfbcfbac389663145f1c74f75f0e287a08a8d250cafbbf762999458f79814dff57

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    135KB

    MD5

    a4e479a6fc26b46000206775140dedb4

    SHA1

    974cf746caaedff9884fb89ace8af2384da446af

    SHA256

    45c6ad3f70a1c519e94e88dfdbe8ad901d7e935777404a489d9b280390a374a6

    SHA512

    5b7684763b272f2c631e9444be8b7b59c0d48c19b79b30929eac384e448c8efcee3825dbe49506b71293ea3f9d2e84257669e7115f0b9df0bc5c1ff53cd6b0c5

  • memory/3716-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3716-1942-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB