Analysis

  • max time kernel
    120s
  • max time network
    108s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/08/2024, 19:25

General

  • Target

    02a15665e08aae16bdfa6669fecbe410N.exe

  • Size

    45KB

  • MD5

    02a15665e08aae16bdfa6669fecbe410

  • SHA1

    18ac23b2c2148bf81db5bffd086a043e1403b7f6

  • SHA256

    43f2345c4713fbfa1b143c7c6f607fe5b2ed16a7b03bacfeaea31b335450cb17

  • SHA512

    3bae9fd2a7fdad99fdb961f5b25371abd4bafa046ea2cd1e956d52bef7012ffc969a5cf9d4c83bcbb746d9c096c60d00a33b6863f2d1b42481883e5cd9c5f7af

  • SSDEEP

    384:yBs7Br5xjL8AgA71Fbhv/FzzwzscucgFQ:/7BlpQpARFbhNIyFQ

Score
9/10

Malware Config

Signatures

  • Renames multiple (4659) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\02a15665e08aae16bdfa6669fecbe410N.exe
    "C:\Users\Admin\AppData\Local\Temp\02a15665e08aae16bdfa6669fecbe410N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4532

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-945322488-2060912225-3527527000-1000\desktop.ini.tmp

          Filesize

          45KB

          MD5

          6d5be7ace87484d1e43c4254b68ecf3d

          SHA1

          97f6d6aead7025c823826f60a4fde2f07984a727

          SHA256

          2f21939ed8e2d3feff5492debda4c406c0ce9083d0793b63ec46de51ad56c54c

          SHA512

          4db32dc41bebea07daa81e79aa2eb40526dcfc0f5d2e46c98c747769e58a07cce92016d866de3319a443f6e093d4d33289dd74a5c43fae68d9ab695191d181d0

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          144KB

          MD5

          cd076bce83e6f77b79eb8e1d4b8ea593

          SHA1

          4221d1143dc279b3307875f7c64316a6e5091876

          SHA256

          c8f2958086680f0ed1a464153f77469fa9b351c14c88e2491923a504b3f10684

          SHA512

          b31828db795cdbee01aaed458c0e1475d3736c8bf8c199326a8f0e52c25d71af21c43dd6a2aab7342c0dc10ed49c9dcb464d408b2f83177cedcdbc4fa9c8d530

        • memory/4532-0-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/4532-1970-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB