Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    24/07/2024, 08:08

General

  • Target

    65711a937a76a438ab4e789e858e4350N.exe

  • Size

    36KB

  • MD5

    65711a937a76a438ab4e789e858e4350

  • SHA1

    5c5d297eb9305c7db5f8dbb8f07a57812c4c2633

  • SHA256

    5c2b25f4910fa0a82f1944d692928f35e9aa00c5cf566f37f0aa95770e221da6

  • SHA512

    88a7b88f1ba336d29ae1d3b56528bf9a9d7022c686e2a57131a9ab80042546b923f5dbac62859d68b99eb33a821f4fec60f3ca40fd369b89de99f8dc3027f42b

  • SSDEEP

    384:GBt7Br5xjL9AgA71Fbhv7bhvD5QASWSVWjWyV/:W7BlpppARFbhjbhL5QbS1V/

Score
9/10

Malware Config

Signatures

  • Renames multiple (3451) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\65711a937a76a438ab4e789e858e4350N.exe
    "C:\Users\Admin\AppData\Local\Temp\65711a937a76a438ab4e789e858e4350N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2260

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    37KB

    MD5

    7a42a01929d55964a3b1b881f98b5486

    SHA1

    5e6d0333f88e5a30c14f2ac2b2a36f56213f24ce

    SHA256

    314c61c49d66fcebb7706c710740b620838e9a1a48631c3b16462b1c2549c08b

    SHA512

    c8cc36645ccbdd66f4d6a0ee355e3e877a51bdb51f93e6cb615e3d23dd302e95cc96c3e8ed967039c339907f2c3464e8782224f7891cba568e7c7af881a90d58

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    45KB

    MD5

    f97c8556afa19ba1d7a032cc060a5148

    SHA1

    6611389b4c951ce06e84d81c7b70beffea0b3b24

    SHA256

    78aab27c4c984ca048e7046f971109696ce2d01e066926f618c95eba025a985c

    SHA512

    4d8af6246e6e98dee9e8e6d72524d6bbe49534d316200a6bca5d3cd248a95bec230807ef12cd62d4bc5cb6fe1d2a564274a6816335bfb7b623d45ca0be4acffe