Analysis

  • max time kernel
    150s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-08-2024 22:24

General

  • Target

    61495835f77d1b8a3f1e54b233900a154d5efa191f02f0f5cc6dd3cc74c2dc31.exe

  • Size

    58KB

  • MD5

    dc6bfefbcc6695aabbc05a0723c9df36

  • SHA1

    21d1212faee145ba147171ee5b15707b534ad30c

  • SHA256

    61495835f77d1b8a3f1e54b233900a154d5efa191f02f0f5cc6dd3cc74c2dc31

  • SHA512

    8e945c7a5eab7e45d5936e3909ef5816f9c8f42ed99ea8c7570d085bfca36fc3d2bcb293ab0cfd2f3cfb0ffdfd1aa621fb0e7dbf47db2041fa0963b6bb5f540a

  • SSDEEP

    768:/7BlpQpARFbhq1KX101je2/Qdme2/QdAe2/QdDe2/Qdme2/QdAe2/Qdqx:/7ZQpApq10

Score
9/10

Malware Config

Signatures

  • Renames multiple (5190) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\61495835f77d1b8a3f1e54b233900a154d5efa191f02f0f5cc6dd3cc74c2dc31.exe
    "C:\Users\Admin\AppData\Local\Temp\61495835f77d1b8a3f1e54b233900a154d5efa191f02f0f5cc6dd3cc74c2dc31.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-945322488-2060912225-3527527000-1000\desktop.ini.tmp

    Filesize

    58KB

    MD5

    821324caf378e92786888a52400476a1

    SHA1

    700684ae407abd80e6ea4da6e11081fea2255895

    SHA256

    a8d4a456b598831cfa7b74fac24a009147d9e31a9f4790f46b651a5848e8d0cf

    SHA512

    582d695f6a32bcd7ea738039e21a9b9dd11814db376a9ff4cf0c62d2068160bda2ba1fff48668b2d9ebb677534eb6c78837180e2dcce5aa3a91b43d99a7a8f6c

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    157KB

    MD5

    56f072e1b572fdce0fb9682c95d7fad2

    SHA1

    de46ed8ba95b4133d1e2c2e123ecbbbee3ce15b7

    SHA256

    5f319e3d79c6733d09979419f27c7899f3fc55bd451549cbb2aeda7a46311772

    SHA512

    29b89e3ca9dbd3ed00dc536b23f887eadcf57fd9cd711caee0564c24857acbcb02e343d56a75a0e7dc042a53e9b686dc628b301f3b73b971f9de310e2127679c

  • memory/4636-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4636-1936-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB