Analysis

  • max time kernel
    118s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25/07/2024, 19:39

General

  • Target

    f0060aacb023236a897fb094a71fc120N.exe

  • Size

    98KB

  • MD5

    f0060aacb023236a897fb094a71fc120

  • SHA1

    ba1953246562dcc2abaa1a45e73ee0bd09b029fe

  • SHA256

    55bab5d1b8c2947322b0ad3aa9a45bec8eac594a82eef6a800714714bfb4a2ab

  • SHA512

    ee4c794cb6627924abe58ac83c19f9ee3272c9ce8869d353dd7f0f13d85282208eba4a238be8ec1f49e1dd9d9ff0b3c4fedef6c69281ea0cb83301ca547cf88f

  • SSDEEP

    768:W7BlpDpARFbhYQkQjjIXYvPXzWPXzK3733uF4V7en5c5HChCrmhyEXBwzEXBwuqX:W7ZDpApYbWjIoPyPoLzV7c6Shw

Score
9/10

Malware Config

Signatures

  • Renames multiple (2823) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f0060aacb023236a897fb094a71fc120N.exe
    "C:\Users\Admin\AppData\Local\Temp\f0060aacb023236a897fb094a71fc120N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

    Filesize

    99KB

    MD5

    586b9ca5bc593ff9315cc32d22b70915

    SHA1

    556f2426ac1ecaafc609d7360ca5dc781979a457

    SHA256

    874b85d0ccae4cbcdb9abe671b98bf896dea6becb2474c56c7bf0d3b306b81d9

    SHA512

    6e87328356feb10477e4a6bd8d32c8ecf74000cbe5cbfb5b96ab34fcea3b83c44954dcac0743233f73209c5b231646c392e60a261dbd35aa91a39cbea5a13723

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    107KB

    MD5

    d8f3778253d83601db3ae2ad5553a79a

    SHA1

    4fdd42d86abcf7fb87381360f9280ee2ac9a134f

    SHA256

    6ca6fcc633ba3078cc4f462d5f98a974adb8b953611e2510d7f749170bcee24a

    SHA512

    2d52c4b54df7a06bd6ebd3b20d3b84226e9f9bea561e98602492db856d312a786e2037aa3c8bf331df305850d4c5fcc90b2052d37d6cdddc4eae55fe0498431b