Analysis

  • max time kernel
    150s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2024, 20:12

General

  • Target

    2fc027e06833c7760629d9b08753df792b99080a0d4f6e2dd9afb53063f983fd.exe

  • Size

    51KB

  • MD5

    44a81b290f382e88d70019267fc7e1b9

  • SHA1

    16435cef73757f44afd4101592093fbeb8b19612

  • SHA256

    2fc027e06833c7760629d9b08753df792b99080a0d4f6e2dd9afb53063f983fd

  • SHA512

    c106cac268de4cd78d4166506184e951a89803876be6ec6d31114f8d40af997c3adf6f96c0ab5a68f4b0281455c5d42f1fd83e2aea4d1422eb3590057acc82bb

  • SSDEEP

    384:yBs7Br5xjL8AgA71Fbhva4S04Shk5c5iZGb8:/7BlpQpARFbhS101hk5c5iZGb8

Score
9/10

Malware Config

Signatures

  • Renames multiple (5260) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2fc027e06833c7760629d9b08753df792b99080a0d4f6e2dd9afb53063f983fd.exe
    "C:\Users\Admin\AppData\Local\Temp\2fc027e06833c7760629d9b08753df792b99080a0d4f6e2dd9afb53063f983fd.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4182098368-2521458979-3782681353-1000\desktop.ini.tmp

    Filesize

    51KB

    MD5

    e7b2eef71e1cd6ac3f6340ac8dc00b4e

    SHA1

    30652b9e22a8f768dfca6327cc287ecd76c89804

    SHA256

    78da80dc723f0920f4b6ecaec4acb21d133505c5a7cbf6addd9e1cbcc65a58af

    SHA512

    1a449a142b76715f5e13a8383bdfb17790933660bbc6c87fb6c368fda154e294b96195a792b004d3cb7f4256a512affa5f7da647bd04ed885deb062ceb6b8b85

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    150KB

    MD5

    66b9f108bdd05ea193be574098e98607

    SHA1

    bb68d5c4bee4609891df4b5653e887429b30e331

    SHA256

    82459153b2a616f7fb3ab94fd67faf2816990d882329681b12f21d543ae662ab

    SHA512

    662d8d3ff02d619e85c60ec78eee1775b99f41b9f74682239fa5eab7781ad5d506e699c318a6f19caadd7c7fc965f5c8ab72a0ee9663e5a4f2e0869aee7c8f7c

  • memory/4232-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4232-902-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB