Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    25-07-2024 15:56

General

  • Target

    df5b831e1368c90f4e11667cc142ba30N.exe

  • Size

    46KB

  • MD5

    df5b831e1368c90f4e11667cc142ba30

  • SHA1

    0e39500a3b9b48f1ec83d42e50faafaf4357cba5

  • SHA256

    06edb03aea9d7454c1b04e2b8d1b93ba4302a77282c7cefda6defb9ed6146938

  • SHA512

    b399cd812fcdc93dee78ebc6fdc99375064137ec80ecff7b8e917a6e15122fceeaf58ab92dcafd73d38b53e4a055db39c3e6cff1df3d29997e7751e16ac679be

  • SSDEEP

    768:/7BlpQpARFbhn54fmiy+3BVr54fmiy+3BV//Mth:/7ZQpApmicth

Score
9/10

Malware Config

Signatures

  • Renames multiple (3104) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\df5b831e1368c90f4e11667cc142ba30N.exe
    "C:\Users\Admin\AppData\Local\Temp\df5b831e1368c90f4e11667cc142ba30N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    47KB

    MD5

    6f69c9118992fb7eb7d52162f4d2aad6

    SHA1

    23f7b7a9e01d826f3260b908c12ee4f9c4c10a28

    SHA256

    8078b24480a78347423789dcfe9e812d01b53bbf2afb8278cd46c6322a1f6164

    SHA512

    ecb4c9326fd6cdd28222c74c14080271ec355c2470062547c7f4dd1d209eb4c01dbec9dd94fff4497297a6a14f0e6b9cf561518bff608124f5a33631db6d3f93

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    56KB

    MD5

    a84da9a19c1d222da5f8ec9f748117b5

    SHA1

    d50a46d45f7ad2ba91eb364cdb8ac4759356028a

    SHA256

    c60581474c1b5b20121f720a71c3c6ab1a2dbc52f7117819b5027711601d4706

    SHA512

    e93bcf2839dae5ef0ad9b853e182a342bcb969e384afb3b2a5b47874f673227eceeb8a4527a81051a757e6938e6411e7fab0ae763c498038569b6b71179b2167

  • memory/588-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/588-646-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB