Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    25/07/2024, 11:36

General

  • Target

    ca2c585bf3b5fa73963d44a79e2fb5d0N.exe

  • Size

    57KB

  • MD5

    ca2c585bf3b5fa73963d44a79e2fb5d0

  • SHA1

    fd7c6d69e81b7d5cf6a20b816cbeecbc192bd0f4

  • SHA256

    382b3e651bc591cba9d7b5b0c17a5bc0bb17989cfc9d1ace7dff298cf3aa5e66

  • SHA512

    61879107fa750b6a235fd691eb689ac3363466d460d9e98ef0e5c8cfd466c7e1271e73b39d669ad865c954c5d486e9ca85e2066f5897c4510df77b75ea0b2484

  • SSDEEP

    768:/7BlpQpARFbhIYJIJDYJIJxfFpsJcEKLF/MF/28HaT9d:/7ZQpApze+ejfFpsJPKZ2e8HaT9d

Score
9/10

Malware Config

Signatures

  • Renames multiple (3187) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ca2c585bf3b5fa73963d44a79e2fb5d0N.exe
    "C:\Users\Admin\AppData\Local\Temp\ca2c585bf3b5fa73963d44a79e2fb5d0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2660163958-4080398480-1122754539-1000\desktop.ini.tmp

    Filesize

    57KB

    MD5

    f9757d9ab488995c8b998711ac7b76cc

    SHA1

    84a93480ac305aa84633982ed673c60804eef46b

    SHA256

    6cf89b73d86d90425b20c28ecbc259af412e29069139f949d31eb4b1448509f1

    SHA512

    49218b50328cac1608df8a5bf6fced5ed7e09cab877fbc3fe3c941638eb4df92cd925fd0996de6e1b9e280fc74a532663a1db7f04c4b0a57512aaa243f2565fd

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    66KB

    MD5

    49ff7d1ec39832242be49c58b2044e45

    SHA1

    78a9651933d249feb8bb2ca7384ee04913fa0389

    SHA256

    c159eaa2feae66da739378a2beb479a90fac63e71c599a8bda66c31adc74e874

    SHA512

    6865f6e1428577035283c6ca8624c549e45767d15eee5a86a44394ed577bf42660168fbf53eb25da0989cdd72e7cb1806e1170db8645898076187b9c169c1714

  • memory/2284-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB