Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/08/2024, 04:08

General

  • Target

    f2c2e3963859a83c4f82d4b7b0d34742727cd4eca535ab4181a89a811ca0fc12.exe

  • Size

    40KB

  • MD5

    dfe36dac618af425c296a414dd70899b

  • SHA1

    0104a9cc587c4f00c00dbca38cde98b283d44528

  • SHA256

    f2c2e3963859a83c4f82d4b7b0d34742727cd4eca535ab4181a89a811ca0fc12

  • SHA512

    19eec3598da432cb67d05a1249a009a2215bec92a026c69460cf7d6fb25408f46be26a08f02e976871e19887f4515e26e299fd5bd768e5c1401a2fca0ccd5740

  • SSDEEP

    192:pACU3DIY0Br5xjL/EAgAQmP1oynLb22vB7m/FJHo7m/FJH6vBSSvBS4FmYZs:yBs7Br5xjL8AgA71Fbhvx/5Xs

Score
9/10

Malware Config

Signatures

  • Renames multiple (5212) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f2c2e3963859a83c4f82d4b7b0d34742727cd4eca535ab4181a89a811ca0fc12.exe
    "C:\Users\Admin\AppData\Local\Temp\f2c2e3963859a83c4f82d4b7b0d34742727cd4eca535ab4181a89a811ca0fc12.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2718105630-359604950-2820636825-1000\desktop.ini.tmp

    Filesize

    40KB

    MD5

    53c6806275713df179a61eab5169f1d9

    SHA1

    456c40ef01b34154b77c4776625a56f73184241f

    SHA256

    6c18d0daf95b76a8db52302df89d8cf4a0384b4073982e276bc2d52fb94c35d9

    SHA512

    61b0a60747e5bf92bc0221c9ef1bc15689b75212517ad580c83e68a22171dd91f45d42c1685948354a14d75c58aee2879d965bd50ae002d3f46287e30b8e6774

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    139KB

    MD5

    031fa1e74911bce65828c16debf6405c

    SHA1

    e556569618096446da4b3e586710282c4cc99b39

    SHA256

    a7f524eb29862dbbfb5cf63cacf6b025993fd48ce4b3f2965f1474ee7eee98bd

    SHA512

    04974ac52f0b0c9dba368ba184d3f228cf0285ede87cfb569e8259de2b43acb27577279cd049e8d75ec4605b9744591bba69a5de0e00c0db0b11ac35a6f59123

  • memory/3572-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3572-1958-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB