Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250502-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250502-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/05/2025, 13:42

General

  • Target

    5974cb8b795c69c20ecf6603ff6c5eaebbde2ce488a6ed6f177294c35caad53b.exe

  • Size

    23KB

  • MD5

    f9cf2c922b9c405e38748fae835601eb

  • SHA1

    1fb54b782ca699ce184aa1be9a17f3995233536b

  • SHA256

    5974cb8b795c69c20ecf6603ff6c5eaebbde2ce488a6ed6f177294c35caad53b

  • SHA512

    96ed2d2f9cdecad61ef2d1e6ef96a3c8391b8c940719533473475bcf1463452437dfea16069a5fab73dc33547ff941ce2141e745e9f4b60de01563e6aefbaa68

  • SSDEEP

    384:hAg+5OCZ4W6/KWLsqmFae+rOAqmFae+rO3Iy:uZ4FLz8ae+rOn8ae+rO3Iy

Score
9/10

Malware Config

Signatures

  • Renames multiple (5197) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5974cb8b795c69c20ecf6603ff6c5eaebbde2ce488a6ed6f177294c35caad53b.exe
    "C:\Users\Admin\AppData\Local\Temp\5974cb8b795c69c20ecf6603ff6c5eaebbde2ce488a6ed6f177294c35caad53b.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1268

Network

        MITRE ATT&CK Enterprise v16

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-186956858-2143653872-2609589082-1000\desktop.ini.tmp

          Filesize

          24KB

          MD5

          df6edf9702f77f6682c3c87ce0a46a33

          SHA1

          adaea79a5f0cfa6c7154da0ff3b5a77dd85cd677

          SHA256

          6299f2812b67b8049858e8e5e1d61443e07f84f5f2be6198470f002ffe82b93d

          SHA512

          4258a9c5b4feb47476c2a4963a029a1adb414df6a4a6bf4c8828adf059ce6687813d5a9f463b7aa90b89307b11dd65a079e5a3765da8e92824078c6b16ee982e

        • C:\d962f70874f5d4bfc1c6\2010_x64.log.html.tmp

          Filesize

          109KB

          MD5

          a40a875ed224fe2d0b6a874641807a4a

          SHA1

          657adeeea80507b33b3df1b46488e464af684ef5

          SHA256

          138c1dd853c7a848a4269ea42e28884f27a5d07aff892a5d16609030d3f6f93b

          SHA512

          6332964cc48f006fa87ea7e906050ccd3067b781782d4328ca113023043ba56f3d379a9918ebe1e6c13036e08e61dc688dbb58e5c473cec7fc89ad3feb569010

        • memory/1268-797-0x0000000000400000-0x0000000000407000-memory.dmp

          Filesize

          28KB