Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-09-2024 09:22

General

  • Target

    915143c5bf7711efcdb5ec4108a7f00b09f191a7c6becd6153a0aae954e3a193N.exe

  • Size

    47KB

  • MD5

    7df9cb950eb855f0329d9dd1be9a9c70

  • SHA1

    7c4a6514d7d03f4a7a01003169c0e1b72a3354eb

  • SHA256

    915143c5bf7711efcdb5ec4108a7f00b09f191a7c6becd6153a0aae954e3a193

  • SHA512

    593faa3e99da960c2643178bfd95cc3c799df52a5678e67f8450bfdb9e1b1237a1d13890bb6ee32c68071bc1fbca6e25527e3c4879d438c67a0bb45738d81285

  • SSDEEP

    384:yBs7Br5xjL8AgA71Fbhv/FYzyKbNzzyKbNUjZ2S8W8Hoz:/7BlpQpARFbhCWK9WKKj38W8Hoz

Score
9/10

Malware Config

Signatures

  • Renames multiple (4650) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\915143c5bf7711efcdb5ec4108a7f00b09f191a7c6becd6153a0aae954e3a193N.exe
    "C:\Users\Admin\AppData\Local\Temp\915143c5bf7711efcdb5ec4108a7f00b09f191a7c6becd6153a0aae954e3a193N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-786284298-625481688-3210388970-1000\desktop.ini.tmp

    Filesize

    47KB

    MD5

    44726dc8721a20b3ca8788f59487cca9

    SHA1

    9ef415bec08a0479245c35ed3a5272cc28ce9bf2

    SHA256

    2187e772bbe0c107f36a698fc41447aefffa79f0aa7c80ac059c7ffd4e767da4

    SHA512

    5c78c4ee4cd398b220f8b6cfd1dae4badace1cd44cb4e24f96e5487932ce221c924841e201cf6aa32726ae1f243299828063f169a89266064b24c8fcdef8b6ac

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    146KB

    MD5

    d124fbaa0c42f7ca1b908166e23ee9d9

    SHA1

    116785f5ec50befcd82f6e6dc08f327c8293813c

    SHA256

    387c4c252fc8496c447d10c64e3e2f0bc7699aec337248221eaced245822503d

    SHA512

    759e7abda26d17af6827b5715b39f9007c637a870922d5fba5de461d3169c83cf868efa25d231a6c6a4d07befc45e9667e59148f158e5424cc46ecf9aaeacaee

  • memory/2984-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2984-1002-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB