Analysis

  • max time kernel
    120s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 05:28

General

  • Target

    09048bc4633299692a032e40cf8c29925ad4973fc3191ef1b70b93a9cfb5ccc8N.exe

  • Size

    90KB

  • MD5

    536c859b7bf8548f8eaf0e5cf4409c60

  • SHA1

    4b2016ce32c1b18f875e9a2eea982c895478f556

  • SHA256

    09048bc4633299692a032e40cf8c29925ad4973fc3191ef1b70b93a9cfb5ccc8

  • SHA512

    72df4077e81969e7b5ad85407e12b21fd41c4ae3d759ec4cdf8a0e865821b324707366a4463b675593dc87b2c125fbfe13cfd225348f0f97fc253dec2d64cd3e

  • SSDEEP

    1536:/7ZQpApze+eJfFpsJOfFpsJ5DQ4PN54PNrqXqo:9QWpze+eJfFpsJOfFpsJ5D7WA

Score
9/10

Malware Config

Signatures

  • Renames multiple (4646) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\09048bc4633299692a032e40cf8c29925ad4973fc3191ef1b70b93a9cfb5ccc8N.exe
    "C:\Users\Admin\AppData\Local\Temp\09048bc4633299692a032e40cf8c29925ad4973fc3191ef1b70b93a9cfb5ccc8N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-945322488-2060912225-3527527000-1000\desktop.ini.tmp

    Filesize

    90KB

    MD5

    294c541b2909b5fd17e510178295df31

    SHA1

    517b7d0c3664537abd006798a79ee0711eac07e7

    SHA256

    0b499342c91534449d5939dd7d5795055ef5ab6abf203355a788b62c6689162a

    SHA512

    c8851919e5ff7c028561a1558baa5d7b2cdd0e6444e24ac7727af9dcc605bae46b1df7b7ec84ade2e701bb240ca08d7d3c89b1f58a8462f552554f6cc3b08c01

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    189KB

    MD5

    dd0f2de81aefff8932a3cf21683f32b5

    SHA1

    3931e1e1e3d3d1cb57e8146c62675236c41b2c1d

    SHA256

    2a02f96a1f98ed6ec95509a26b37d427cceca1374c4e892c9275a6ed742aa63c

    SHA512

    67618e932f430d0320f67628a1fee947b4d721b9106d00e568d177675c370abfa5f132cf0b3acaa1569448e7cffdc983348604eefe02f2e4ff8f82ffcba98a3f

  • memory/1552-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1552-858-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB