Analysis

  • max time kernel
    150s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-10-2024 01:08

General

  • Target

    9bae641995d628dcec30b1d22502309e1df24b4867459bccdfbe536f417cfac9.exe

  • Size

    57KB

  • MD5

    3dc8ad641068a174b45b33b803c037eb

  • SHA1

    b0c49e113152586ba6b2659edd57e1360fb5b6f7

  • SHA256

    9bae641995d628dcec30b1d22502309e1df24b4867459bccdfbe536f417cfac9

  • SHA512

    0fc8f928db6010350eeced8e526900b4b708f6043d5877a3df8103f157edb32129042e0b4fbb6bca614b98aa9819710ab534d688168a44a8ff6202fa20ef57ee

  • SSDEEP

    384:yBs7Br5xjL8AgA71Fbhv/Fzzwz72Jwuq2JwuR0U0Iap3gyaHq9nwK8gvgyaHq9nX:/7BlpQpARFbhNIiJwsJwwnZap9QKQr/A

Score
9/10

Malware Config

Signatures

  • Renames multiple (5123) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9bae641995d628dcec30b1d22502309e1df24b4867459bccdfbe536f417cfac9.exe
    "C:\Users\Admin\AppData\Local\Temp\9bae641995d628dcec30b1d22502309e1df24b4867459bccdfbe536f417cfac9.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:4508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-945322488-2060912225-3527527000-1000\desktop.ini.tmp

    Filesize

    57KB

    MD5

    b983d6cb9bc3fd978be911a06123c8d4

    SHA1

    a805fe64264cb230d522b4f5f2f85c55352f0a71

    SHA256

    9cf792c6d87a71d8bb717ab09af77d1bd354b5b8ae95b1b5c6e2aea748425c6a

    SHA512

    4fa49089ed79a1b0cd01d130c18cec2eb234fcd367d8855d468c3ff556426d73c0c832fbbd199c42d73a7f59f15392c14b4464a73ab367181cd94b7881c6f130

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    156KB

    MD5

    4ed7ab20ceedf9976359f3fd75b83c61

    SHA1

    49c08e396bfe371d4d9861c8dec31f5c07f917ac

    SHA256

    1727c1341c634d6fd317716fab30a8d9624bd70abea24205fc7cb25df1485980

    SHA512

    c657c0e52bec48b6688b3bd1f41276ee2a7844a91e8061087ae6ddbcf496256e6b9d2d6b80cffaa02ec8d3bdfa06c7ef90104266f6b7e307bd9d3f9960c492a1

  • memory/4508-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4508-910-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB