Analysis

  • max time kernel
    150s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250502-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250502-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/05/2025, 13:45

General

  • Target

    5974cb8b795c69c20ecf6603ff6c5eaebbde2ce488a6ed6f177294c35caad53b.exe

  • Size

    23KB

  • MD5

    f9cf2c922b9c405e38748fae835601eb

  • SHA1

    1fb54b782ca699ce184aa1be9a17f3995233536b

  • SHA256

    5974cb8b795c69c20ecf6603ff6c5eaebbde2ce488a6ed6f177294c35caad53b

  • SHA512

    96ed2d2f9cdecad61ef2d1e6ef96a3c8391b8c940719533473475bcf1463452437dfea16069a5fab73dc33547ff941ce2141e745e9f4b60de01563e6aefbaa68

  • SSDEEP

    384:hAg+5OCZ4W6/KWLsqmFae+rOAqmFae+rO3Iy:uZ4FLz8ae+rOn8ae+rO3Iy

Score
9/10

Malware Config

Signatures

  • Renames multiple (5286) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5974cb8b795c69c20ecf6603ff6c5eaebbde2ce488a6ed6f177294c35caad53b.exe
    "C:\Users\Admin\AppData\Local\Temp\5974cb8b795c69c20ecf6603ff6c5eaebbde2ce488a6ed6f177294c35caad53b.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3772

Network

        MITRE ATT&CK Enterprise v16

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3951986358-4006919840-1009690842-1000\desktop.ini.tmp

          Filesize

          24KB

          MD5

          c845e7044eb8a336f97c177bc5f31a0b

          SHA1

          79b21364a7651e86fd2907cd9a0c179dc0a12e47

          SHA256

          714b13e8e32030106bd174e30fb82f7ffe660fb8dc30eab4332f268aeeacaa77

          SHA512

          269fe2afe70674d964d4739f7528e77577722aa74cff00be4177fd1571fd38b524d5841e312abb424e5e183d82b564243e165763abf9c14979c889af2fc8157b

        • C:\e871de07eca81c0a47\2010_x86.log.html.tmp

          Filesize

          104KB

          MD5

          3ab797259bf3b107a6e9f789fe7d182a

          SHA1

          0d87030323f75ccbc43c86ad9daeba363fd6c8b0

          SHA256

          5cde1e7eeb0d174ce2b0f75832ab0a94213b5bc14e8f502f69518df01315ca63

          SHA512

          3300bce067b693581a31004f15921bf859cea31b04c7f487130d14af290e6968fb71afb118a41bdb2eed68ed403b78a5441d9d0e687e7f70c51c3f22676688ad

        • memory/3772-805-0x0000000000400000-0x0000000000407000-memory.dmp

          Filesize

          28KB