Analysis

  • max time kernel
    119s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-08-2024 05:04

General

  • Target

    a3a530839ef8703daa8077e70636e690N.exe

  • Size

    42KB

  • MD5

    a3a530839ef8703daa8077e70636e690

  • SHA1

    556ac8a526c46002e5f227907cb30e8e1d865dfd

  • SHA256

    f05da185d3f481a1d52a9cfed2fe4159b9f34b0f2e0d790a60b7be261ad0cb12

  • SHA512

    860d7330eebb549c91cd523b4fa89a1ec473ef9010872140d2e4a99cd3d01c96656c1b9bc8340eca847f045f256de5f550f2e6190456068ea5373268bd776f1d

  • SSDEEP

    768:/7BlpQpARFbhefnj0Tjfnj0TPuqKDKrvPf:/7ZQpApouSvH

Score
9/10

Malware Config

Signatures

  • Renames multiple (4677) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3a530839ef8703daa8077e70636e690N.exe
    "C:\Users\Admin\AppData\Local\Temp\a3a530839ef8703daa8077e70636e690N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-523280732-2327480845-3730041215-1000\desktop.ini.tmp

    Filesize

    43KB

    MD5

    e5a6c1b5a3ff99f35e62aab87da8bda8

    SHA1

    877412a640c72b8281c9cd3d714fe2cb6ee42444

    SHA256

    c407c81590029c968e904d80669a14712ac98478a93fddfe46207178b188e695

    SHA512

    2b0b52201381cb2c3f10e64f5dde6103c53b93cb1007851cc1afcb59cfb2d152b5724f50d6e928a61d8088912409b103689bc29f8a717fbbc83c22db9692c9bb

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    141KB

    MD5

    5633da0e5b1547096a221d7adb995338

    SHA1

    8ed437cc9b73377d82653499f1e63774a2c382a0

    SHA256

    389053bddb7a1b638a7ebab7d192be587ee8a4a03cccf6756b28be28b549ec7d

    SHA512

    baa78a756afbe5fd1ce2e23de67c38b335f6cc01f80f3b11a7b85d6297020fdbcc8d512ccaef4925ab50796c8ff2ecc57071ff649719399d8c25781b3b13629d

  • memory/4792-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4792-1012-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB