Analysis

  • max time kernel
    150s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-07-2024 04:35

General

  • Target

    dc6a4188b7a0c9a7bab46602f32142480cb3e2ac650fe29e222714f576c22735.exe

  • Size

    41KB

  • MD5

    421915ff034b49eaa7772d51aabc948f

  • SHA1

    1d242aaaf9dbe4b29950869a5d819254c444c9b5

  • SHA256

    dc6a4188b7a0c9a7bab46602f32142480cb3e2ac650fe29e222714f576c22735

  • SHA512

    fe23f984282b453ea0b10f30cfa5e7f6138f9ae3005eb173a3cbdcdab1d32a799387abf17111d1341163e5aed6051e5ebb2118852d1644561e548a830567770b

  • SSDEEP

    384:yBs7Br5xjL8AgA71Fbhv/F1UkLUl7b5tLUl7b5L:/7BlpQpARFbhzUwUnlUnL

Score
9/10

Malware Config

Signatures

  • Renames multiple (1904) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\dc6a4188b7a0c9a7bab46602f32142480cb3e2ac650fe29e222714f576c22735.exe
    "C:\Users\Admin\AppData\Local\Temp\dc6a4188b7a0c9a7bab46602f32142480cb3e2ac650fe29e222714f576c22735.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2116

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1705699165-553239100-4129523827-1000\desktop.ini.tmp

    Filesize

    41KB

    MD5

    0f89213095beda29c9c64e7920b6b8cb

    SHA1

    03f42f3bfb49f7ed9647aa81f0f13fe02d261999

    SHA256

    d27a191c8e50e6abbfbfb129a126b6607a4af8a1f110ca29ba63fa40432fa82f

    SHA512

    c5cff7383f4dcdf7560eb31156f3a123b70546204f690325b42fa8b56eb519cc16496b880b1dee4c00835b3eeb4b97e5407c13a39934447683ded3f82677e3ae

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    140KB

    MD5

    8b2ce96274277c214c186423185b88c1

    SHA1

    2be01a62be447d5dd5013d936dcac57e777d14b7

    SHA256

    4fb457f29f621ec061d8761a40ac16a14694dee7578aadac96a4ef3d242f021a

    SHA512

    fa53bef79b9d8510aeddab4e73ad443a7b53d15684978b47ae2dc848503deb8fa88bf7d589141c3a036717cbcbb8e189606afa7f50ba0f8a142e49bcf6a4f17b

  • memory/2116-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2116-878-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB