Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    14-07-2024 21:15

General

  • Target

    2048fb44555e2ea8622ca163315e8590N.exe

  • Size

    68KB

  • MD5

    2048fb44555e2ea8622ca163315e8590

  • SHA1

    2a6412e977dc5eec2943bd71a036651247d6725c

  • SHA256

    f2ab59a9e3b315ec7a47ead8f1d769fe56abed204df393f4d3577a6fd75e3ae3

  • SHA512

    fda870ad95bf2afce33eb2266b1be0d7dcf8f146a345d7fa7eb8e9a1b18570738947d4282391bbcfb10df1aa62955355512f6ce645700452381051898459f19f

  • SSDEEP

    384:yBs7Br5xjL8AgA71FbhvJUfWGUfZe/HtT8lNvqe/HtT8lNvO:/7BlpQpARFbhiWbb

Score
9/10

Malware Config

Signatures

  • Renames multiple (2856) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2048fb44555e2ea8622ca163315e8590N.exe
    "C:\Users\Admin\AppData\Local\Temp\2048fb44555e2ea8622ca163315e8590N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2028

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

    Filesize

    69KB

    MD5

    3f6e0905aea350e8e18a8a823fc0ada3

    SHA1

    1fe9131accd47e9342114f9c2624aeaf6450dbf6

    SHA256

    5bd1e8b64f208f267980fc343595117f16c0d8006c66404eb83cbb8ca7cb9cf8

    SHA512

    fd78b7e2dcbc158701719d5ad4f14ce44cee7b965d9897a42daa644ca3e894a4dbb216564dcc72fe1f4cd69a3b65c1a63415c6f5d5958e24b36ef59349b4e734

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    77KB

    MD5

    4f8f9e04a3fbb01c839671aab45ca356

    SHA1

    58c465d202694b7239f605cebdb35f0ba26e1002

    SHA256

    a153295c9108d20d9a811eb236858093d64aaacad2882750e9c29b5bdf7c7535

    SHA512

    da02f78e54a4e0b7514d90059a2443ab7efcb170094f5c413642f85eed5a503e31f0ef6e9b0ebf76c5109c62df7016e1f010549d6a7d948f1392454f2ccfcae0

  • memory/2028-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2028-536-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB