Analysis

  • max time kernel
    119s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    27/07/2024, 21:51

General

  • Target

    077cf1830ce7c5815bc4c17dcea3aea0N.exe

  • Size

    32KB

  • MD5

    077cf1830ce7c5815bc4c17dcea3aea0

  • SHA1

    b89f98873f09acc1de997b5207e5e36a979cb245

  • SHA256

    6b946a84f446141c28d404667a9930bca0a235fbe00f7cf296bd13f598fdf533

  • SHA512

    f4e6bd9b04b71cc51bda0eb334a6aff987a1c2116d32717d73e5bb498af227cd025793eef66cafece2c51aea6eff69ebe92afde160ec989297c248014b7ab493

  • SSDEEP

    192:pACU3DIY0Br5xjL/EAgAQmP1oynLb22vB7m/FJHo7m/FJHA9jxjH:yBs7Br5xjL8AgA71Fbhv/FH

Score
9/10

Malware Config

Signatures

  • Renames multiple (790) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\077cf1830ce7c5815bc4c17dcea3aea0N.exe
    "C:\Users\Admin\AppData\Local\Temp\077cf1830ce7c5815bc4c17dcea3aea0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    33KB

    MD5

    46c736022a622f6ae5f8bbadf5ba3648

    SHA1

    e3fcfe5c2d5c71f76ed9e8adb32b8de259d9f03e

    SHA256

    8df5b0ebc6107d85a286279f8275adb9fd69cdecd2a0f91b1663d15764482b12

    SHA512

    fbcc9971e5c15ee03d35e38b8a66bf3881300eeecb2ff23c2c691e8b52328e4126b97ca0e7f2ba81eb2d51fd623207d1ee01f382f236bd89e4c33c33383991ec

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    41KB

    MD5

    0ba3968ac7cd89a69a98c81b02f62e31

    SHA1

    0c455c227e68a7a73f5df8bc96e7e5afc424cc5a

    SHA256

    1e4aacd6878f5cff5fa1549529d4fd9be11742f0e1ef33a0b160040f3f4789ce

    SHA512

    858fabc0d035982bf05eb10bcb56d2fb36e27a6d1c1bf16710c0a86c421b4f1c45520d33dbb22d3c6d1f2a4405c7bc76db979a452a755f68fdb004b5fec28ca8

  • memory/2984-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2984-102-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB