Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    24/07/2024, 03:54

General

  • Target

    462352107525eba9d5d46bf5d34f7f50N.exe

  • Size

    55KB

  • MD5

    462352107525eba9d5d46bf5d34f7f50

  • SHA1

    2dd0e96cfb824d7d46ec3a973a4cc015508928e8

  • SHA256

    0d29126aef2a66b0a72d7213988fa54f4281f18c9c4e05cee69fae36a05620ac

  • SHA512

    17b45e5a45f3731962301f3dc0cf67747f0ea4bc44e0cf3cdbf47967b1b1367b176796b944afde0508ee81aaaefae2c163dfdad1d4cf8c6865ac511d0e662081

  • SSDEEP

    768:W7BlpNLpARFbhblkYlkuvIYFdakTkXnCPdUPdsbK/KDoh/OXiJ2AOXiJfoh/OXi9:W7ZNLpApCZuvIYXYCuabK/KA4B4U

Score
9/10

Malware Config

Signatures

  • Renames multiple (3108) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\462352107525eba9d5d46bf5d34f7f50N.exe
    "C:\Users\Admin\AppData\Local\Temp\462352107525eba9d5d46bf5d34f7f50N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    55KB

    MD5

    ec785037f2831d19f404f88867ad760d

    SHA1

    bdf004a7005f14c83b6b0d606398d6dbb3eba64e

    SHA256

    7a07b9cf19064b543b48356c6e4f95527b7c6bd07703813d3ef42addf6c5f275

    SHA512

    77d4ef808e64a3f2848e23d9ab92301788578cfa2a5a3761e3df699a0770efc6d38f600a21e484870c4bb6d6cfe61c4774e70e33b73556eabe1adbf62fb5258a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    64KB

    MD5

    c759c8dde7332da1ea1c63d86ff56e8f

    SHA1

    a122ae435659d680832922505b63421faefefe4d

    SHA256

    318bccd6c35d261b133fa5b40305e3fbbf929684cfa81af884ca8a22a42e8465

    SHA512

    471fddbbd2c3e474b69e7ac0622a669b361e24edf22a086116310b91b9b0d1fa8c7f74c54cd7713c17c53a8b8ac282afd1e5058e26e3b552df46bb4a30a695db