Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/08/2024, 21:14

General

  • Target

    3e33fb1881320abf39fbbb899d84a0fdf663ac4953548615584404101c9b107b.exe

  • Size

    37KB

  • MD5

    f80500ff2a5244b90850ff315477b3d1

  • SHA1

    a5ea6020495a9af0982da22ae4bd0759c87d06c5

  • SHA256

    3e33fb1881320abf39fbbb899d84a0fdf663ac4953548615584404101c9b107b

  • SHA512

    c13a369fdb4d7836df714e1ac5c4cb1cda9123d75bbbe95b15dd2fb0fea936cfcf9633333efdfd6e01946b6a5b9e271a09c1c0a24baa59e7e505aec565fb330e

  • SSDEEP

    192:pACU3DIY0Br5xjL/EAgAQmP1oynLb22vB7m/FJHo7m/FJHdGeqc4SUqUGeqc4SUi:yBs7Br5xjL8AgA71Fbhva4S04Sl

Score
9/10

Malware Config

Signatures

  • Renames multiple (5214) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e33fb1881320abf39fbbb899d84a0fdf663ac4953548615584404101c9b107b.exe
    "C:\Users\Admin\AppData\Local\Temp\3e33fb1881320abf39fbbb899d84a0fdf663ac4953548615584404101c9b107b.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2096

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4182098368-2521458979-3782681353-1000\desktop.ini.tmp

    Filesize

    37KB

    MD5

    5997d3517e7aa64d18a12ab961a6ad3e

    SHA1

    84749933d1a3f66046836fe89876d7c4d5de737d

    SHA256

    61db9a5042d0b46eb8209f94ded2250891a161fedb3b5d5c348e758d2a92bd0f

    SHA512

    2579bdf05f733c7d7588ca774b6259b856894d52385fcb905728f5b2f1b75ce23a59ab6e8cd37b7ac9c9a585cbb2ba7673ecca323dbaee0b20d6a12f6b40e7b2

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    136KB

    MD5

    6b9a7a4e8770947b669954b35052e1d9

    SHA1

    2fc39e99e63a8a37ebb8be42803dd6865a31e5f5

    SHA256

    43eb438dd729bf01da0e66452b19fb100e5ee252965f4e2a262452e5dd51aba5

    SHA512

    da9e38ae131f48fd84ad93476140109a0cd94e24fe7b477f5bfec6b26170f29a27ef90eae733b30f1ffae18c12b7e7d934139cc94eb7d1a6bfcd06820f4ad1be

  • memory/2096-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2096-908-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB