Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-07-2024 02:58

General

  • Target

    c1647fa089f8dc36f3d10778314b9e762d14abad783118058ae4a7ba835dc2f1.exe

  • Size

    33KB

  • MD5

    cff9c4d2667034b46987f38be4858b41

  • SHA1

    901364035ef8bc25b7466b83d6f054d2800f6d62

  • SHA256

    c1647fa089f8dc36f3d10778314b9e762d14abad783118058ae4a7ba835dc2f1

  • SHA512

    dd605fab0180fb53e7db483d68a4d5fe74f1d9110f89aaf09c8a05b1573fe7cbc59cc7eb10d948bed4b63ef681bf96169dafbec9f6a9b0e4e8782f93bf71cb51

  • SSDEEP

    192:pACU3DIY0Br5xjL/EAgAQmP1oynLb22vB7m/FJHo7m/FJHscLcNx4:yBs7Br5xjL8AgA71FbhvlcLcY

Score
9/10

Malware Config

Signatures

  • Renames multiple (4685) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1647fa089f8dc36f3d10778314b9e762d14abad783118058ae4a7ba835dc2f1.exe
    "C:\Users\Admin\AppData\Local\Temp\c1647fa089f8dc36f3d10778314b9e762d14abad783118058ae4a7ba835dc2f1.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4496

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-384068567-2943195810-3631207890-1000\desktop.ini.tmp

    Filesize

    33KB

    MD5

    ba41bf9825e226466721313641e9f08f

    SHA1

    8c72534bbe45033c40a745bc1647ffaa1837af89

    SHA256

    e86b35b8ed919e9d44d00e08a5a9bc9e18c91b1cf46fb8d9e63f63833f69fbde

    SHA512

    200c0fc1b8b7a5abde4face2f0ef6f28e07a24773eb37583fdfb51a697eee9415289926677ece6786abb8b4884a4019e5350fddd798e02cf1e0af9083a4219de

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    132KB

    MD5

    ba8796f6cb56a9bd9b0a671db006850e

    SHA1

    26d545fb77768b679342adb317fd06721ddd8d27

    SHA256

    ff4bbc8953636cfec66391bcc3fb6c2637bcb087cceea40728455bd55314caa3

    SHA512

    f2ca45f8238576f26267e2e1b573fabf4fea715d70bcd960f030a53638d682e3b3f7825ad860c6550e9c01f5533d3745533bd4244a67e5e040012314a9d9cd71

  • memory/4496-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4496-1702-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB