Analysis

  • max time kernel
    121s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-07-2024 01:53

General

  • Target

    7d6715d43da05d57b6ebcdfa4633d110N.exe

  • Size

    79KB

  • MD5

    7d6715d43da05d57b6ebcdfa4633d110

  • SHA1

    9c40162e2385a89fee2f578f16982dfe25df3044

  • SHA256

    61b102f985452d851420617da961ce00fc5ef4ebbd53394f2be17e4a4b96b3b5

  • SHA512

    438b9be085b82682afae31fa38679f98ba6ed02527014d57c6e75aa3d973bee4b70a5e99344f87ebe146311725e58d9bedf468d9699462acc75304335c1bbfc1

  • SSDEEP

    1536:/7ZQpApze+eJfFpsJOfFpsJeFrxFrZY0QT:9QWpze+eJfFpsJOfFpsJ0rDr8

Score
9/10

Malware Config

Signatures

  • Renames multiple (1657) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d6715d43da05d57b6ebcdfa4633d110N.exe
    "C:\Users\Admin\AppData\Local\Temp\7d6715d43da05d57b6ebcdfa4633d110N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2636447293-1148739154-93880854-1000\desktop.ini.tmp

    Filesize

    80KB

    MD5

    19104455c6770a651cc246a3b197ac3f

    SHA1

    235d420cd5f45d954f46e431556c83e39ade6a91

    SHA256

    2b1059a4b0cf6cde094909fb73f09a248c96538e267ecb65a87a382a18f86e4f

    SHA512

    d1060c0a8d635087df0c5fc30b5a11239e77d503b778be469a609f127e9ce200a525f4f74bd4a19ca767aca1de16530bb4bf149629eeed260b63e71090c7f7f3

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    178KB

    MD5

    a00b385b3bb558dd89bd6ce155e3cb54

    SHA1

    58f16950ce59111a726a6cfe0205d034de8503a6

    SHA256

    33b7cca4b8b01862dabc66335e1c6fd460a09600e0a0365cbf629a6be2d3e378

    SHA512

    bca0b5c033ea3d4cbc3f8b4628f77c311dc70f8a3c702925e3c0d754cb8cdf294fd0ab320c8ce7ca3d604656b55a9262865d69b42c9e92ca7b008db509168e16

  • memory/1924-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1924-1028-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB