Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-07-2024 01:50

General

  • Target

    3221864ea83f81cc1bc8b36b080de000N.exe

  • Size

    50KB

  • MD5

    3221864ea83f81cc1bc8b36b080de000

  • SHA1

    46215e598cc2ec1250fd776970d9d34cc5d016ae

  • SHA256

    0016f385395b9da566997851ca1c4b6944d633a9279fccce9e062057be5b7821

  • SHA512

    d25846db4608572c6d8d5b56f7a91d230d068c2d297faa425bd95761b2d201e809c7c77bf9cf1131b50f507bdcf671512beabe2f5c3f2bd6540a36431a63fdbb

  • SSDEEP

    768:/7BlpQpARFbhIYJIJDYJIJPqAlJIqAlJVUrn5c5hU:/7ZQpApze+eMUL67U

Score
9/10

Malware Config

Signatures

  • Renames multiple (1791) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3221864ea83f81cc1bc8b36b080de000N.exe
    "C:\Users\Admin\AppData\Local\Temp\3221864ea83f81cc1bc8b36b080de000N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-384068567-2943195810-3631207890-1000\desktop.ini.tmp

    Filesize

    51KB

    MD5

    461ca1b32951d818b6f2b019706ad67c

    SHA1

    653325e4946484f25f81a206420a090280a71296

    SHA256

    83d00ed05d1c0c627502a8b7df359846cf15ef2477fc3c72e77b10282682d097

    SHA512

    1a8eb498b7248d7e59b1327a486209a402517af96615985e68b6c1e1b0404b3a68d631e37b3fdcf426cfa98ba28655e50c58fe0f8b5c150c8ab8518db38d6bc3

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    149KB

    MD5

    39c98ea33129c8597d20cf53d9358b88

    SHA1

    06fcf5ad357b246045edcbe9d6043cf288742abb

    SHA256

    0f9da111487ac0ac681a8e0830c0c3a758b85045bbbbfc9249fe02119f21ca6b

    SHA512

    ae72f5f10d302b695798890244a40a4e3bb212ced67f441f3c072a1a072c7b660a727d9f834419a831c2bd71a1601108274016f718dfef06332934fcdffe73ab

  • memory/4092-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4092-1186-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB