Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    24/07/2024, 08:03

General

  • Target

    650853dcade558186bd73dc99bed1300N.exe

  • Size

    40KB

  • MD5

    650853dcade558186bd73dc99bed1300

  • SHA1

    b02fc65dc9a5a1f408ce3c735718173827fa332d

  • SHA256

    f80a631e1737763389e3536010be8f8a5965f5a8a4ae813bff0381c8da17a6cd

  • SHA512

    01d73f3f78992a18f1fcd40f45cf24d03f0169e8c3414c779dc332c18975302584d4e5d1248ff0e7a1b7d3855fef568fe570e01c63b7b55efccb9db37d642aa6

  • SSDEEP

    768:W7BlpppARFbhknrzzA8JQ2AdJCzA8JQ2AdJcUYU0:W7ZppApkxUYU0

Score
9/10

Malware Config

Signatures

  • Renames multiple (3385) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\650853dcade558186bd73dc99bed1300N.exe
    "C:\Users\Admin\AppData\Local\Temp\650853dcade558186bd73dc99bed1300N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3036

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

          Filesize

          40KB

          MD5

          fc2e4d1724d77ba285676b391c33a47f

          SHA1

          4141f10bc6754384682fae3159e445895cf50ac3

          SHA256

          1cec77af423e5933835d4a0c917806fdac033fec0fd0212aee59237d574fcd6e

          SHA512

          7578eb7f5a7af393eb226039a514fc803f88e4da876180405656c92f288ca8940e6273d96d3176831a4f8742c0accbb46a1c923f5776fed8d1618e3ea3599664

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          49KB

          MD5

          e1001ab1b43b855fb6898849bd180837

          SHA1

          be404cbcffd7ad794a9baf79f3de02afdb0ba8dd

          SHA256

          7ccd497eeb871ce57c5f900aec8ecbcedcef32c962445db9cf6672884357bbfc

          SHA512

          a14e7f5c29d172fa147c1be164f3c1c5dde704ddd47907fbd4ef1a7ea27bc39925c6d65f6a6c0d31578748e46f16508b31f139fd50d832a11123cbaa8f85589a