Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 15:59

General

  • Target

    29f09dbe811a133692c8843f1751c870N.exe

  • Size

    38KB

  • MD5

    29f09dbe811a133692c8843f1751c870

  • SHA1

    38a57d033324f00dc005727c277c8a3c064b954c

  • SHA256

    15c696f808a99dbaa86495e020ebb8a380e912c60d0b45f2ae53427164d9bee7

  • SHA512

    4ddb3d315a6c1c807c6381d0b968ad66d9cab687ad7c6f36d369d60c9f4e9535982e0c1dad98959804c53798b1d038e2aba82667d8445145879e9ba458c230ca

  • SSDEEP

    768:W7BlpppARFbhjbhQYjYY4F2j3TK54F2j3TKj:W7ZppApB1W5Wj

Score
9/10

Malware Config

Signatures

  • Renames multiple (2938) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\29f09dbe811a133692c8843f1751c870N.exe
    "C:\Users\Admin\AppData\Local\Temp\29f09dbe811a133692c8843f1751c870N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini.tmp

    Filesize

    38KB

    MD5

    743ab24e6428621f610425e341e4d5d6

    SHA1

    b6946282f44ff917223978a705e055ba7bf1fe63

    SHA256

    9f68072e2f17a0a0401a1e0dd2af4187827037d1c302397cccdbff569fcb929a

    SHA512

    1da523e531bcdf5c9e751f9290fd6969f46129c38b0b45f1121014c23dbb08ff6046343211a4dcfa3eba58d0cc0fb4c701b4cdb96e95f570442301d319e999ea

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    47KB

    MD5

    880fd07b21af03492a0e741dae4d2873

    SHA1

    be5c700367deded7c0298d707e5803b2762573cd

    SHA256

    6dc73344b9732eb05a226231c48c5e632fcdb52ef30d08884a67c54e2c4f6799

    SHA512

    625f339f4fa5c5f0df1e53c415478f72bc852f7db00d382eb4b3af38e2ce09ef1b654d2518c17465d40b0baebd32ad9fe4bb570f50eed84d674f0b1d7242d032