Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-08-2024 18:41

General

  • Target

    1473ecccdc524754919878e5b3b047b75c0f589b53344d260b9bcf58f228278a.exe

  • Size

    38KB

  • MD5

    13b73e26ade1c2c9f69d75b6026ba945

  • SHA1

    bc632eb426714c31c1c3248f8a6b94c95af380af

  • SHA256

    1473ecccdc524754919878e5b3b047b75c0f589b53344d260b9bcf58f228278a

  • SHA512

    23044f8a19e3891364aa95a79b0cdf4069c5d3d2f44781198309ac307890a8e4529e74d8375ff66dda1a50fda8cd36ccc7c73c5d1be70f8bd73dc40c2b270275

  • SSDEEP

    384:yBs7Br5xjL8AgA71Fbhv/FzzwzrYcUYcr:/7BlpQpARFbhNIrYcUYcr

Score
9/10

Malware Config

Signatures

  • Renames multiple (5282) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1473ecccdc524754919878e5b3b047b75c0f589b53344d260b9bcf58f228278a.exe
    "C:\Users\Admin\AppData\Local\Temp\1473ecccdc524754919878e5b3b047b75c0f589b53344d260b9bcf58f228278a.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1302416131-1437503476-2806442725-1000\desktop.ini.tmp

    Filesize

    38KB

    MD5

    6432495dc3f0170414b200d764928320

    SHA1

    1c3dc9146112215a9b6c8f6c382ff2ce1c5cd6b0

    SHA256

    a2d640e13e310a13dd10d5d79e42d85708974c4cbedd1a0801452cebd92d383b

    SHA512

    9df21dc92cb6fa27f288e3873e669bccc02ff6302f4ff4bcef35a3f241665e6b3e4c5c15b70157b5895700deee87c9edb3b2df07facfbb008e5d40b7ae253559

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    137KB

    MD5

    97fbea8f1091af01798391b31a1cb95f

    SHA1

    793cae9956bbe4aaecc70a12fd3825bc0081b825

    SHA256

    ac87a99146aedb64e4a30157c980bdb6dd72f9a5ea98419ce1dabcfe713bf42b

    SHA512

    2b20020c78b2866b9443be8181993af2346160dd9359b13ec33158d897606cb400534c1abcead4bbae8ef1d38dbaa7d591a7a91c68f41a7e5ed21fc95f3f8754

  • memory/3708-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3708-2020-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB