Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 15:35

General

  • Target

    25d48c017f3b01d3fa147e3373b88d30N.exe

  • Size

    51KB

  • MD5

    25d48c017f3b01d3fa147e3373b88d30

  • SHA1

    23a9f9d75fee82616f88e5fe9487f1148a43aad7

  • SHA256

    73e5a913a0d5a147d126c2beace76ddad374a8e3f3b3c03a784c3a5f8672a71a

  • SHA512

    478887a429ec80801daef4b816fd2b96078455fc06f901221b43f982c3ea6d119b8e0499963fc1e2759eddc89ac1817996f445d88a3420ed3914416874fa2cb4

  • SSDEEP

    768:/7BlpQpARFbhfUnUnlW1VkRawAlW1Vo+L:/7ZQpApfWlLkLh

Score
9/10

Malware Config

Signatures

  • Renames multiple (2076) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\25d48c017f3b01d3fa147e3373b88d30N.exe
    "C:\Users\Admin\AppData\Local\Temp\25d48c017f3b01d3fa147e3373b88d30N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    51KB

    MD5

    93c2e67217bb98e43f6e4812efb72d2b

    SHA1

    27dff91410d92afc1d9a09de72b69f4870d050b6

    SHA256

    96bc8ddb0a8f4484d88b41e3d58e4170ada5f0d16b665cab36def2227756f7d9

    SHA512

    8ac0e99cb1c67c2f3f71e4151111d41400d4eef44052eb115b6395c6a101636fab0031e63e600f10edd5c097eb3227328f4c0eb887e04666c91c61985aa20594

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    60KB

    MD5

    9d669cef7fbba5cd0b1724a5f9418f46

    SHA1

    a9f19864dae34c0fe48a2195298da325f5f8331d

    SHA256

    9943371ff084bad027a4df7a3a4cfe67e9bba5eaeff399a9d2e40c8c0b66620f

    SHA512

    16a22436ee6a826965cbf2e3a7120a1d9c877182ae61219b38ebeb7d139f53f8d25af1e6dd809bd7b4101b3564a97b2a3385ec8c13cf65ff3419f25ee201d62e

  • memory/3044-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/3044-124-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB