Analysis

  • max time kernel
    150s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/07/2024, 18:25

General

  • Target

    0824da157df0c93ff874eec69e19402e1c72fc8e9fba0c78d6381d016ef61ec7.exe

  • Size

    36KB

  • MD5

    e7adc8c3c881a5b494fbc8c250b2c5e0

  • SHA1

    8f91532adcc6e72b20a1cb45e57789ca92e1222b

  • SHA256

    0824da157df0c93ff874eec69e19402e1c72fc8e9fba0c78d6381d016ef61ec7

  • SHA512

    bf18640a0e7b8c8ea8a89a152e13abe9a7af94e00bcec49b42987ce218573e95d0964e83ae8451558aca781ec7eaae6b5f320267d49d4fff9b5ac655384fc24e

  • SSDEEP

    192:pACU3DIY0Br5xjL/EAgAQmP1oynLb22vB7m/FJHo7m/FJHdGeqc4SUqUGeqc4SU8:yBs7Br5xjL8AgA71Fbhva4S04SH

Score
9/10

Malware Config

Signatures

  • Renames multiple (4741) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0824da157df0c93ff874eec69e19402e1c72fc8e9fba0c78d6381d016ef61ec7.exe
    "C:\Users\Admin\AppData\Local\Temp\0824da157df0c93ff874eec69e19402e1c72fc8e9fba0c78d6381d016ef61ec7.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3496

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-384068567-2943195810-3631207890-1000\desktop.ini.tmp

          Filesize

          36KB

          MD5

          63eeab0996673a8f890096ac3fb49869

          SHA1

          ec13c72ff62bcb2849c455397ccf877bca979209

          SHA256

          626ae4c43976a334ecec1c996363fe78b4589054bb2db72b55ba514b53d35429

          SHA512

          ff64958749cd0f2e93dbe3a18730823d707f445042ae4aeaf6a8bff3fe0a0b510682b46bb067e49b05519608d411a7fa0d9813656088653bd175271ef562163c

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          135KB

          MD5

          640147af4741d45ad6968c25d1d0655c

          SHA1

          02ff174ac03e2f53abebe4ff4ffc1bb0724f1d7b

          SHA256

          d0cbfa1eafe29737fdd5cbf9bef4ce8e027cf46c1f467d279372cc264e87a110

          SHA512

          8ae912681be61040c588467b4d5eb4f8e251672c24a0b0ce394be04cb9a4325440ed11234ce3fa327e5fa96acc7b71a0c2da073ef281633739cd66d18622a33e

        • memory/3496-0-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/3496-1786-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB