Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    24-07-2024 03:49

General

  • Target

    4587ec5f87a22b22d5c7e20ab19761a0N.exe

  • Size

    47KB

  • MD5

    4587ec5f87a22b22d5c7e20ab19761a0

  • SHA1

    68952ea4f7f30e23b3a5c2b5cfc3ac77c288aa43

  • SHA256

    63da49a101677f051ca492079d439402b2316c67ea786aa9ff3c57ae5046ca1d

  • SHA512

    190db74cca31acc5e0d3f105667287be7f5e2911115f01b28f82f95473751e7af1850ce5f3eb03bb641641f472f9e03d2ac8f21af380c667d15a2c4eabc02213

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfpZi4w9i4wMNFpOyPRRRTFMu+RRTFMuf:W7ZppApBULcfpHLcfpVwhwMDpOyPRLKn

Score
9/10

Malware Config

Signatures

  • Renames multiple (3261) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\4587ec5f87a22b22d5c7e20ab19761a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\4587ec5f87a22b22d5c7e20ab19761a0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

    Filesize

    47KB

    MD5

    26a8b0e799f4dcd545521a951e2f3138

    SHA1

    e81480958cf46710e71f964bc5629393d5d94700

    SHA256

    abf08996ad2dbf3ac81e79a5e90741cf8dcfa36e0d7096fb9f161a4ca7ab2d7a

    SHA512

    d1c85ff775ca20065dfa8634d3dd42fa2fd6878bbcb3f9d24882e83f9f058d74dabedb08b0b01d258e70f313f6e10985f27d54752eaf1414fac766f88f68498e

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    56KB

    MD5

    7ad34da7e01d786feddadd59cf613e5c

    SHA1

    6cf9d4245f31b34a989ef5a8495dbf685420301f

    SHA256

    c9f661bbde72a7f076e567ca3fefef19f216d352bdb3468b301c342d3eb0e7fa

    SHA512

    14d6db4d165b476283c79571d2489010fee935015540ac3017e8a693c02f69b706e85ad6a359e959ab6cd84f2cba79d5323bb2ac2081805d994890bd097a7521