Analysis

  • max time kernel
    150s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/08/2024, 00:23

General

  • Target

    8d89b38ce159a8a535944cb717dcd6819d3cea2ffd2f09211a0803e7f38bb6bb.exe

  • Size

    41KB

  • MD5

    06db94285e6d203748da857007cb9028

  • SHA1

    166bcffdc7ca30a9dad382729983ba9716660d70

  • SHA256

    8d89b38ce159a8a535944cb717dcd6819d3cea2ffd2f09211a0803e7f38bb6bb

  • SHA512

    97df3674d187e555a80466cf7995b2de2503fce55e50384f4ff32d2258291e0f5b504a782f8540756ddaeae1d30a5d347d30ebdadd63d8d211cf9746782dfb14

  • SSDEEP

    192:pACU3DIY0Br5xjL/EAgAQmP1oynLb22vB7m/FJHo7m/FJH6vBSSvBS4FmZgMOMM:yBs7Br5xjL8AgA71Fbhvx/5MgNZ

Score
9/10

Malware Config

Signatures

  • Renames multiple (5325) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d89b38ce159a8a535944cb717dcd6819d3cea2ffd2f09211a0803e7f38bb6bb.exe
    "C:\Users\Admin\AppData\Local\Temp\8d89b38ce159a8a535944cb717dcd6819d3cea2ffd2f09211a0803e7f38bb6bb.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:964

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-4182098368-2521458979-3782681353-1000\desktop.ini.tmp

          Filesize

          41KB

          MD5

          80fb14a8cd8dda2409a75f20d9401dea

          SHA1

          ae84fca0457647236c86de960384586b63349cab

          SHA256

          110658cec3c466b5c2a20401b04a6a270766cf7a9af43f42d5b8710dc5c51c3c

          SHA512

          ae0c3924d94a87463e046111504ee6b3901ed36577d944c4c08807ee7034ffb6c54e2afd7bad0c11ae75ccb358d8908d063e1af38e66d8d497bf891f50a2ece4

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          140KB

          MD5

          41f811df83081a5e34e5a712b7371a6a

          SHA1

          ae0e15b4ef391ab7383b0272077a4623f60712d0

          SHA256

          d961bd46036bae5968bc62f127e9fa1b5e1ffa7bd71a1a307b710c1a1dc8bbc0

          SHA512

          248ad788cf7b8735485b35947fab7afa2e9ea5f3ea4f3f11bd5d5f2ac719a50e2b5372e97b518037053db0780bda4711333c35e35ff619aac6a99292c464c273

        • memory/964-0-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/964-1982-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB