Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/08/2024, 14:01

General

  • Target

    0597096aef42929f1d23520381a32140N.exe

  • Size

    42KB

  • MD5

    0597096aef42929f1d23520381a32140

  • SHA1

    98b433e91c687f6428a2e53da9d049ba01fdd9bd

  • SHA256

    2078503cd02f6794a16738701069f5e02929b742dfa360472f507c7fdedfb250

  • SHA512

    01f17bc7c2af9f6e9c1da8e022668b7ee6e71f075705e9d1a5dfc7012bc51a9e9aa852fd367b485f37b28635eb66fda36fc61825b8b0706780d5b62ac3a9827f

  • SSDEEP

    384:yBs7Br5xjL8AgA71FbhvBfepj3cfepj3KtLJilqGelqGa:/7BlpQpARFbhq1KtGFGa

Score
9/10

Malware Config

Signatures

  • Renames multiple (4915) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0597096aef42929f1d23520381a32140N.exe
    "C:\Users\Admin\AppData\Local\Temp\0597096aef42929f1d23520381a32140N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:5036

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2718105630-359604950-2820636825-1000\desktop.ini.tmp

          Filesize

          43KB

          MD5

          d1ce62148cbe5272241297257bda61e0

          SHA1

          d909a780527e1b7ead1607bcb8bcad6b37700f09

          SHA256

          c37dfad87a73d42ed135ce11ba33babe1819ed2d8bd2c7f2b0a17bafd9f517f8

          SHA512

          abc84e25f8296bdedb69b57124414705be3e2d72a14b82f20e21f1a08fe5f24808d78ae3d5ab6c7f5c6b8b3db112e99aeb8524e3e75f5e6a7f9cf111ce642775

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          141KB

          MD5

          33b341f733f4e4176c07d2d9e926b3a4

          SHA1

          cbf91a811627f28fb63bad3d1f53b7c1a6a92e75

          SHA256

          5f832582d4e01224d716fde9484295c66ca64ca7a36f827d2b3ec92bfedd51f1

          SHA512

          322fbb0e9ff30f29cfa2a83f8918a54ddf039917a9db6d071f2b476028232dc77f30e59dabca38b624b762cc7cadf89e9e36ff6a81414c943406a7ed824020f5

        • memory/5036-0-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/5036-852-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB