Analysis

  • max time kernel
    150s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-08-2024 18:17

General

  • Target

    03c45047b879cdc372af76dbf4b2c518a2b678de62c11c811f33d4dfb42f5a8c.exe

  • Size

    44KB

  • MD5

    57ce5372788fce7fd1f24ddf5a5ab72a

  • SHA1

    692cba8da3b25ec4dbe473b6683c59a12135a623

  • SHA256

    03c45047b879cdc372af76dbf4b2c518a2b678de62c11c811f33d4dfb42f5a8c

  • SHA512

    0bc2a18d2c086e91f60c11552a74137b0299f056d32090bf1a05a14c213195f989d3a72a3ceac8aedbcc9fc40d0e2afd218039e1897d215fa361160118560cb5

  • SSDEEP

    384:yBs7Br5xjL8AgA71Fbhv/FzzwzYGXnlGXnBwsr:/7BlpQpARFbhNIYYc

Score
9/10

Malware Config

Signatures

  • Renames multiple (5269) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\03c45047b879cdc372af76dbf4b2c518a2b678de62c11c811f33d4dfb42f5a8c.exe
    "C:\Users\Admin\AppData\Local\Temp\03c45047b879cdc372af76dbf4b2c518a2b678de62c11c811f33d4dfb42f5a8c.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4182098368-2521458979-3782681353-1000\desktop.ini.tmp

    Filesize

    45KB

    MD5

    afc204b4107041b07df628db90ef7721

    SHA1

    8ae129235dea8a8bc0bbd1951b7f943993b92826

    SHA256

    65d0fb4964d38f0a6bf60bcf20342fed6ad3183f8359e27c8c9e52c68ba4df55

    SHA512

    874952683b88faab3c52904b3885de0950f68604c54fe5903fa8c107fde3e02496c67c3171ef4b943e8819d877c52ad7d126278df19fca60f04ab39289b1a9a5

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    143KB

    MD5

    50b19c8b26895934f648deaaf4b59362

    SHA1

    5c241f427664f327efbb92ea240ed03aef20446b

    SHA256

    fcb81e56e86dbd68845826f5d72cc86b9d40c10aade9b738e3cf9e065692daac

    SHA512

    278b1b26d6b11140f77cd8139cdf9ac30449d995a1315d0e323664bff578438f84aa9f4f1ca6132fe78857589ae26dabdf9561d20e2a540af35cbf4a4cb0b969

  • memory/3632-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3632-1984-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB