Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/08/2024, 04:26

General

  • Target

    ea3c9e277182c009c38f0ad64cb22bc6b6c0bf3abb8ee1255eaee7b4312774d0.exe

  • Size

    41KB

  • MD5

    f58a256778841a8a885f9f9798e796b9

  • SHA1

    5e45c93b93f7b077c99fae802af5cb78e7cab974

  • SHA256

    ea3c9e277182c009c38f0ad64cb22bc6b6c0bf3abb8ee1255eaee7b4312774d0

  • SHA512

    8e155aad07050a359db64a9dbb761afb76fca93094f6623392aadcc8944d62d8a0b476ef94cb82ec929f494cb9ec0ba99d44a76bc806931c8d0e8fe35e5d94e9

  • SSDEEP

    384:yBs7Br5xjL8AgA71FbhvPvD4Qfxd4QfxI3V:/7BlpQpARFbh3vzfxRfxI3V

Score
9/10

Malware Config

Signatures

  • Renames multiple (5303) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea3c9e277182c009c38f0ad64cb22bc6b6c0bf3abb8ee1255eaee7b4312774d0.exe
    "C:\Users\Admin\AppData\Local\Temp\ea3c9e277182c009c38f0ad64cb22bc6b6c0bf3abb8ee1255eaee7b4312774d0.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4252

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1302416131-1437503476-2806442725-1000\desktop.ini.tmp

          Filesize

          41KB

          MD5

          325350f7064886db29bf4944e8e3e5cd

          SHA1

          f7973d5c599b23061d0deb22f7b4c0414a3c694e

          SHA256

          2ee1ab9c4709bd51df2b7acc0dea092b8db0e8a656f219b0810f5b670f63b447

          SHA512

          faca5e24b7797e3492291fbc20920962bd5df79c723ac85cd9e112b63a6457f288c670af7895c8a17f50c0e6341d321070a04d45b21231f19df5c85a6332c664

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          140KB

          MD5

          fe1322cb09bd67b48565178824d9d151

          SHA1

          866507be669a9701a292a9ec28f1a74846d37059

          SHA256

          484451932760f70aad4a0656de1439a2e589b94a9718a5c560c9f4b644514f1c

          SHA512

          4184d44e3784d565c81312d6183556b02ea625d3eda283a7328f19a67731435238fee2c1f0bcf5fd8789612cc9373454f24f9c9756bd9161965d43ec0bcca2bf

        • memory/4252-0-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/4252-1974-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB