Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-08-2024 03:00

General

  • Target

    c33b80e15a663a809e2fe8df00bce4c47e49b8eed2d2f3b1d563178afb8128e0.exe

  • Size

    47KB

  • MD5

    43f1315621bff3c8cd5a336be705094c

  • SHA1

    dd62be2510d39a11c22d85ec5153f44f4f62bd2e

  • SHA256

    c33b80e15a663a809e2fe8df00bce4c47e49b8eed2d2f3b1d563178afb8128e0

  • SHA512

    cb15ee55f84a6cc93249fb0751972877f3b46e8b4af83763dc0219c906416246aad4f3d4ff2f1b883b55db64d5fdcd9d09404287e506d0c3a821f671951b9b4f

  • SSDEEP

    384:yBs7Br5xjL8AgA71FbhvBfepj3cfepj3KtLJr4S04SCzwzv:/7BlpQpARFbhq1KX101GIv

Score
9/10

Malware Config

Signatures

  • Renames multiple (5201) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c33b80e15a663a809e2fe8df00bce4c47e49b8eed2d2f3b1d563178afb8128e0.exe
    "C:\Users\Admin\AppData\Local\Temp\c33b80e15a663a809e2fe8df00bce4c47e49b8eed2d2f3b1d563178afb8128e0.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-656926755-4116854191-210765258-1000\desktop.ini.tmp

    Filesize

    48KB

    MD5

    b0a4f8d0fae3843aef3346a6a771f8f6

    SHA1

    f0f3fd39a96a3ecece4fe2b35c48dc2ce49e1462

    SHA256

    33f33368a08c015653c68fa7e7b6709ab220e502229ed71b36010a2f5db8d3ff

    SHA512

    ba5018229d79ef4c29350e700efbb9a80f91d4956f2714c7f61c9d3f4df56639a6674078443d7e8f69a6e5cef81151c96cf8dd05285ade707bde6f23cb8afa24

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    147KB

    MD5

    88569c59712397c8ee07b3207e197a2a

    SHA1

    ba02781e41af0911569b58e4dfbdc828894766d3

    SHA256

    936bb4358517b07f0d80a132d727837d9121cb0e4f7e23df71989404bbff9eda

    SHA512

    fa78fb368d8890ff962817ef1730d3c2544592d8c944a676ab252802603143fffa8d9b35815eb5952d7440ed28ad7cf9922d90d8366dd1c96dcafd7c50eb7f40

  • memory/4868-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4868-1978-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB