Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    24/07/2024, 04:07

General

  • Target

    479b85b07e4bad1fe1c2bd7773fffdb0N.exe

  • Size

    56KB

  • MD5

    479b85b07e4bad1fe1c2bd7773fffdb0

  • SHA1

    c630ba833dede0fcd07402c56d350c45059e7a07

  • SHA256

    cb52e8b8a9e48a35a4e5ae60aa840471503ba41723d8db0cae48c530cf46e037

  • SHA512

    f36a539c6609b2bfc2b9fcc72d6cf8e5e043bf09f36f7a2f89144ae12df06bccd93bc9d9f7f8f8ffedcff2d3938f7548503dec92c3f25e482fd1303024523294

  • SSDEEP

    768:W7BlpNLpARFbhblkYlkuvIYFWcDYcDlvcYNnVvcYq:W7ZNLpApCZuvIYYoYoN7n9M

Score
9/10

Malware Config

Signatures

  • Renames multiple (2838) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\479b85b07e4bad1fe1c2bd7773fffdb0N.exe
    "C:\Users\Admin\AppData\Local\Temp\479b85b07e4bad1fe1c2bd7773fffdb0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2128

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

          Filesize

          56KB

          MD5

          3299dd8d18eede5c137505efe0e712e0

          SHA1

          b406322de7769f3d4fe6773776d1bdfd1e4f98e4

          SHA256

          a3f0c96510968d29f3f9fa4aa62c708e2d199a7d27620a8bdb781d2b269c82b4

          SHA512

          f7ffd8f435e6f69f3f3dd69745a0d1d580ad65fcad07cef69d7d39f1f9915a72b3fa8067ce725323e5dbbbfe2a518fe5289e24172b405c8d7f53c6aa190a1180

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          65KB

          MD5

          de112f86899e65b304caffd3496a514a

          SHA1

          a5f4c5f300711fbdb487e42b7aeb6d801ab26cc3

          SHA256

          ca96d4725d672b24b1b0d566e6645899b12ec8d424d9b49e00c29d4417b118af

          SHA512

          54aef9420f5f422aa448baadfba68948807031e12b5811b310ca5f7f2cc32d67d13b971b85ad08cd42b38053843f8684fb3abd936d87595583c41ac3c72becf9