Resubmissions

28/03/2025, 16:52

250328-vdc6kazry9 9

24/03/2025, 22:22

250324-2aphra1jx7 10

Analysis

  • max time kernel
    424s
  • max time network
    435s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/03/2025, 22:22

General

  • Target

    4561647.exe

  • Size

    7KB

  • MD5

    ebbc82f619471384f392efd5c4d05883

  • SHA1

    17d91b45c8615d0f09d1100d2be396cbcba21fde

  • SHA256

    e972af26d5261da3daa1e12e11f357e1e4ce19cd43997f6b7a925a5b9cc8614c

  • SHA512

    3e33bd22c440e9ab4a065d216467c1220780aa2a39a38ea4aec81d050d3e6048e87244341fbeac2cdefebae9fe987b713e0d4fcf34adf1390b5ccda6dd448241

  • SSDEEP

    96:uP/EuJO5ER8KDGrru1M2mIspl5SgOj9/xVKzAQTH1osaxnkK:unE5ORTD91M2mIGyxhp2AQRONkK

Score
9/10

Malware Config

Signatures

  • Renames multiple (1679) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4561647.exe
    "C:\Users\Admin\AppData\Local\Temp\4561647.exe"
    1⤵
    • Checks computer location settings
    • Enumerates connected drives
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\4561647.vbs"
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:4956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\ENU\!_READ_ME_!.txt

    Filesize

    502B

    MD5

    b0952e65955eaeca0064f1a368acb216

    SHA1

    5b5074c950a480fcb920b8f3ff108cfcdeaec639

    SHA256

    e1263206f1524bac3c87a1ad532780dc326415cfd01ee03e9775ff433e57ad4f

    SHA512

    7610fa182d0ddf8879ae3178dc099be53cf5648ad3eb7f8acaef178ea1ccfa5f74bd8afe9a8a6b9066737f9faff2230d4e402017a197fcf7e51151cf6c64b3a6

  • C:\Users\Admin\AppData\Local\Temp\4561647.vbs

    Filesize

    373B

    MD5

    9266e359efa382b829dd86da49d0e7e8

    SHA1

    bb8556218ea57ed70329f6dbda2c1888c9721a09

    SHA256

    33c495267c6443a04590300b55a1eb1499999fecc7e0f511218dfa7b08ea7979

    SHA512

    7c9de391a3800a169b024c863cdd01f71f9deb4b5edecf849408882c5fe5c3141b856ed3d30117d2b3ac202e012e689c15514a9e24b09a5f6f1c3429bc20239a

  • memory/1960-352-0x0000000000400000-0x0000000000507000-memory.dmp

    Filesize

    1.0MB

  • memory/1960-2875-0x0000000000400000-0x0000000000507000-memory.dmp

    Filesize

    1.0MB