Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-08-2024 19:15

General

  • Target

    188c92fad20e985cfaa121a17a2486ed278577f4dbd7bdd14db5e50b46a0bf1f.exe

  • Size

    43KB

  • MD5

    4adf60f07301aa8fc2f78349fc26a10c

  • SHA1

    01bb60461df6b361700660863154a65f6d30c5db

  • SHA256

    188c92fad20e985cfaa121a17a2486ed278577f4dbd7bdd14db5e50b46a0bf1f

  • SHA512

    ef32c7ce0990cb5fd95ba341aa616248acaf1414b9806d9543f1dd541780a84b1f3b080f4c6cbdeb82db929221824f175d597b984333b38b98e1dd22ac2309d8

  • SSDEEP

    384:yBs7Br5xjL8AgA71Fbhv/FzzwzSMn76GRI0Mn76GRI8:/7BlpQpARFbhNISC76QC76A

Score
9/10

Malware Config

Signatures

  • Renames multiple (5047) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\188c92fad20e985cfaa121a17a2486ed278577f4dbd7bdd14db5e50b46a0bf1f.exe
    "C:\Users\Admin\AppData\Local\Temp\188c92fad20e985cfaa121a17a2486ed278577f4dbd7bdd14db5e50b46a0bf1f.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1194130065-3471212556-1656947724-1000\desktop.ini.tmp

    Filesize

    43KB

    MD5

    b53ba7a5b73c4a1243187d07b32ff389

    SHA1

    3a06eb720de6e2ef07ed3a2e4be8fa0458c3a9a3

    SHA256

    1d3c1e38268b132e5466bbc48cb78c3fe8740a2886a31b209ef5c4cc08bdb79f

    SHA512

    fae9a316b35521c5f74d0a36d1e13451a2d9970a4f7a2dd8ebcac28bbd9a6e66b27cee3b23ff1828bc134b187fe294054c4d5e1b57443315fc2dc5408e263efc

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    142KB

    MD5

    5aaab5c9e5053415e31b97df37780456

    SHA1

    5e2b3048026321039d78f3bb3974da1347c3f62b

    SHA256

    b820bb52b7b39419fb9fb8c9a411a5a6bcf45eb6403a366e29e2a6a3794f7c70

    SHA512

    8b9424a8daa63b213e41c3a0d04cae12e854eb73f05834df4bd6357cca9f618b861348ce2ced0a7e1679a9ac6f9030df45483dd68fa95687c42f2d5500e6d6fe

  • memory/3988-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3988-856-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB