Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-08-2024 23:41

General

  • Target

    46f98961689813289132855c448444b0N.exe

  • Size

    74KB

  • MD5

    46f98961689813289132855c448444b0

  • SHA1

    76339f4f6a6954a8d6c44083f7518a84d3b5cac1

  • SHA256

    e84dbe20dafd400756432f0f65dcb95edfe43decd8f90765c5b2ac9043520a5a

  • SHA512

    52a23ab4b0ef95628299ea44de4a651246925d1060612c544987bea6bdfc40506763df76714f4e78370f519cdc62ba31c5dee4a7b29171e878ff7756dc8680f9

  • SSDEEP

    768:/7BlpQpARFbhIYJIJDYJIJPfFpsJcFfFpsJcC+3mC+3meDAfABJ6fABJwEXBwzE0:/7ZQpApze+eJfFpsJOfFpsJ5Dq

Score
9/10

Malware Config

Signatures

  • Renames multiple (4654) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\46f98961689813289132855c448444b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\46f98961689813289132855c448444b0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-945322488-2060912225-3527527000-1000\desktop.ini.tmp

    Filesize

    74KB

    MD5

    b786810350f2312bac9d558540d94e4e

    SHA1

    636e37ec78b3c7d60f24f8d8aea0348fc2c33919

    SHA256

    ce24d8478b2f0dd9c25e70e7681d1f18f52959f1d3e20e1087d3c96d4279e4fb

    SHA512

    9d07a8ffc67331645adbf956e41f56e38d518f94771dfec29b38d85770f0d88d0037519bdf96ba11079a4b6acc0c02720944e4f67be20362bc83be38c5484938

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    173KB

    MD5

    080fdbe6e5c9c8bbe22d4876afcc54d4

    SHA1

    0b7cc04427901d792f818be1ab999785eabad065

    SHA256

    4fe9a18ae156935a983c177b3b0964604ec2789f971893a761d77578f260ad0d

    SHA512

    ee15b1788089b30fd222f339d11acfaf9d8c9b31cf0c46dfc030942f30988970434de1d65d448d8b9d5554abef8daf9ea35b1036d22ed3d51e267dca1ae26c28

  • memory/2540-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2540-902-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB