Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    24/07/2024, 01:15

General

  • Target

    3058c4c8afee97efb52385e761beca10N.exe

  • Size

    73KB

  • MD5

    3058c4c8afee97efb52385e761beca10

  • SHA1

    bd9ab8e968c250b45c63f7faa6abb9530fba7bb7

  • SHA256

    a39604a4591540a682f64bfabc33ad57e2c24dbb112a2cfa3914240b599f5edb

  • SHA512

    ed928fd52f17da12b0f5368d52d17deaf1aefba330a05cd8202ff9f037cf51cfe099ab0fb78180d83b85b4ea7bee0aa6f4add64663c5bb0c7b3428a20acf81cb

  • SSDEEP

    1536:W7ZhA7pApMaxB4b0CYJ97lEVqNR7Yge+ejy0Wjy0WmDJ:6e7WpMaxeb0CYJ97lEYNR73e+eGGmDJ

Score
9/10

Malware Config

Signatures

  • Renames multiple (2948) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3058c4c8afee97efb52385e761beca10N.exe
    "C:\Users\Admin\AppData\Local\Temp\3058c4c8afee97efb52385e761beca10N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2340

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

    Filesize

    74KB

    MD5

    8eb0af6ab43bb32b855ea112ef181943

    SHA1

    c23aee2df580ee58581a19f467fc19be85bca709

    SHA256

    8a30fe12838225d4a9d7c2abb75d41ec442251dd7bc928f6c6937414d7d06f70

    SHA512

    293040b41cc6c3061dc1276e6e3e386a009b54a8c944349377e8778b5fda837b4dcfd8a42c260334de8327166e03454f342bcf88a1c576e048f507f912679238

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    83KB

    MD5

    8e5f025f4a8074c232b0a8a38a9aeb24

    SHA1

    95cc8c944997114d92cd27bb7e019050a8db3af6

    SHA256

    e6aabda65671dd3efd9c0a7f763a1488ed878cc14720267fa6616fae02ce7cc3

    SHA512

    ba9dbcbde8d2b88e410bda2b34816d5ba2f0d89edc6058b3e193c6f231fc5df116b6b960aa8cb789a5e0ce18bc1335afc92715f7b0116b3d8fd3f6329d5f19d0