Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/08/2024, 21:13

General

  • Target

    48b11c223e18db09026763ae533147844e0832aa115926cc233cd69ded3fe431.exe

  • Size

    52KB

  • MD5

    48fc8d1f6b5830cecce3f4bb4fc20bfa

  • SHA1

    11c892f78d90fbcc0dc1bd31c0eff4187e2910d9

  • SHA256

    48b11c223e18db09026763ae533147844e0832aa115926cc233cd69ded3fe431

  • SHA512

    fe06306a57ad8bd53ad678d5cddb8ec3d9dfc0db4484a068550dc014f381e93a5952e574a917862a65ff2fc57516607f6e76e2a97987aff63a006e35405ac7e0

  • SSDEEP

    768:/7BlpQpARFbhfyiyooa0OMiJfoa0OMiJ+PQT8Yi1xKT8Yi1xM:/7ZQpApHzoPQYGYQ

Score
9/10

Malware Config

Signatures

  • Renames multiple (5243) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\48b11c223e18db09026763ae533147844e0832aa115926cc233cd69ded3fe431.exe
    "C:\Users\Admin\AppData\Local\Temp\48b11c223e18db09026763ae533147844e0832aa115926cc233cd69ded3fe431.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4672

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1194130065-3471212556-1656947724-1000\desktop.ini.tmp

          Filesize

          52KB

          MD5

          3151b561834b6821737f47c73ee02c8f

          SHA1

          2aba622328c4b3d73b298eb73e5af577483c08e9

          SHA256

          78aad2680028281da7d41967ee5ed2bd20fa7ab3c1520e3f98d6b2733adad6b4

          SHA512

          d1882fd2c63399622ab6d8ade89d25ec78a588e74c13cfca5fef3cfe854967e331e8a6de1199ed29270b95cb881647bffbe119ffb65ae3e8d290096bfeb6a46a

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          151KB

          MD5

          2db6b6d5ab7c33223bdc1533c8c35c3d

          SHA1

          5e1b20312675e6bff8e842204bdbff356a5bf7ab

          SHA256

          9a9c011b43524c07227484bf1b65440b9f7c827ca711c132ac9e1b1e60012b6e

          SHA512

          95457f93c95f9ff43d3fa891bb2fa66cb9f9c2bfff8f5ff4e876c64d8ff84ba193867205e579c00b1d2f70a94db25758699feeff371b9d93f8b2ae4e9449483c

        • memory/4672-0-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/4672-1980-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB