Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    25/07/2024, 19:12

General

  • Target

    edd0430c979033231567d7c6233cbcf0N.exe

  • Size

    59KB

  • MD5

    edd0430c979033231567d7c6233cbcf0

  • SHA1

    0b3527f34c8a8f38c88b5588c8637052b39fd98c

  • SHA256

    58a0ec8974e4ded2d8c27bb0d2ba7260e836b0620bd220461bff541295acaa5b

  • SHA512

    0895a5d3b85fdce9fa2b5d0f7c33dbac6cac56e29c4c81fd49ffa610996fb5ff5fa125c5a17fb2c13b5482749cba9e5b00ce1533eabc6d10415cbeb90cfe3d2b

  • SSDEEP

    768:W7BlphA7pARFbhvOsTKnKqtUK4F46OK4F46oMA88bRyvkijaTpA:W7ZhA7pApvOsOKjv46Ov46MbRsjaS

Score
9/10

Malware Config

Signatures

  • Renames multiple (2817) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\edd0430c979033231567d7c6233cbcf0N.exe
    "C:\Users\Admin\AppData\Local\Temp\edd0430c979033231567d7c6233cbcf0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2316

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

          Filesize

          60KB

          MD5

          5fc192a3f854a34e8eb41948e50545c4

          SHA1

          520e0ab93886b33005d9b2514a6fd82eef93b242

          SHA256

          01a848ee107e1e55a5db2e1a5086da0e97c991c347917fbdac31606697ffd9e1

          SHA512

          38cdf89d4c3fb67bf07a371c712757eb13b8093ce7bbe52d7e034f35c9f990f9c5004a6e6f4390208244f1b3cbd53277547636f6b203fc10fa505893c5ac933e

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          68KB

          MD5

          b9553cde67828dd452d81d0f35a773b4

          SHA1

          3bc9c6095c424dcd40d3fae69f1267c103e505c5

          SHA256

          3a01e8506411e16fb77561493f300be4475d3dacd47ff8a930c46fcc01fffd98

          SHA512

          44f583d3e2c89dd71432cb35a1654b15edade0e8069efb1d42c586dc2c746ee122f09c274e20232be1984153a3639976c7b0c7ae4765f04b0bbf99c7811f448e