Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/08/2024, 23:03

General

  • Target

    778b29fb3570e62114e29dab7c2e0dd7b1fd3b1b65df0bf9f546b1abdd59970b.exe

  • Size

    52KB

  • MD5

    561ed89c3ab87ce3a34d78d2ce230d83

  • SHA1

    35911b72b8a6d8f4de9412c3acf9038804c0c8c1

  • SHA256

    778b29fb3570e62114e29dab7c2e0dd7b1fd3b1b65df0bf9f546b1abdd59970b

  • SHA512

    60c592ad9f7919cbfd4d4bd66c34af3be6f31d1442de4b5571719781c42dd2539fe3e8439924f07350a9463a22c80f4a287b3f96c95e7273c392289fd09adbd9

  • SSDEEP

    768:/7BlpQpARFbhq1KX101je2/Qdme2/QdAe2/QdDe2/Qdme2/QdAe2/QdA:/7ZQpApq1w

Score
9/10

Malware Config

Signatures

  • Renames multiple (5185) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\778b29fb3570e62114e29dab7c2e0dd7b1fd3b1b65df0bf9f546b1abdd59970b.exe
    "C:\Users\Admin\AppData\Local\Temp\778b29fb3570e62114e29dab7c2e0dd7b1fd3b1b65df0bf9f546b1abdd59970b.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3252

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-355097885-2402257403-2971294179-1000\desktop.ini.tmp

          Filesize

          52KB

          MD5

          96383f81bc9b53a545ab23713675fb3b

          SHA1

          3266ca2d8e72ae2459a8a6e4d616978037ae1330

          SHA256

          66c74dac3f66fad7832bda533a476c240e07f1a69c24a04531cd9910d10dbf96

          SHA512

          4cea1e4435d4c78fe81062dc2df09b2adec6d64d89c884a917077cd9d2b940c070107973012b1f05c567523f612e1d46bbe150bbaa65af82f727e61a767d2cd8

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          151KB

          MD5

          066b71ad538fdd6a49f7d1797406c0e1

          SHA1

          b41534d7a61f559b090d7602fdc5b82b1a862ff7

          SHA256

          9f62b6666184b5a671ebb11a2ed20f6d1d4c93605f0614053dcff2a7347fd16b

          SHA512

          48a4ec62067106ff5106d85d0304f4be92c154bf88965f06fa72c951b7453034cc0380cb4c79c688efcee7432cbac1adaee022762493de4e5523b7a2666d2c6d

        • memory/3252-0-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/3252-1972-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB