Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    27-07-2024 00:54

General

  • Target

    763ef444738ef8daf6811fb0718e8bc0N.exe

  • Size

    36KB

  • MD5

    763ef444738ef8daf6811fb0718e8bc0

  • SHA1

    41d65fb54d1ce8bd29ce85cba43ae4356a73d651

  • SHA256

    e1fab8ce13ddb1268460151124328f5efefbd6ab5f4eb485a811645bc41577a0

  • SHA512

    a34debe2eefd1c71c18b57717b44d7403793cc718439451978ed7c626f60234b05ed13244eee30632b96b1ddc37d010d89889116c8731d47fe224259a0be44a2

  • SSDEEP

    768:W7BlpppARFbhjbhQYjYY4F2j3TK54F2j3TKm:W7ZppApB1W5Wm

Score
9/10

Malware Config

Signatures

  • Renames multiple (2642) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\763ef444738ef8daf6811fb0718e8bc0N.exe
    "C:\Users\Admin\AppData\Local\Temp\763ef444738ef8daf6811fb0718e8bc0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2204

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

    Filesize

    37KB

    MD5

    b7be7ebf238699ad4c512048645a5ee6

    SHA1

    9317ec278fb798f8468c833be848b691df116326

    SHA256

    24b9091f978e588b1859377fe1de33c78e47d96600dd87b99abf5f6968c61353

    SHA512

    ac79e9dfc3453bf3bab76a1b908120a1915b7cb1ca85136e5fcf19675ab57919497ab9a2e58792823346b7ffd355775b78d94c88d0d333907a96400cd26ffe21

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    45KB

    MD5

    1e362dfd5297c4456350d00ceac7f3d4

    SHA1

    8afff1ab30fd4ee4f47241ddeb6a4ed526ca8163

    SHA256

    871d6d2cd05bcb5f118d13ba582adf940f430cc0eb6ee127e5ac39b5ddfdbeba

    SHA512

    5b2adcc5bafdbf017fc4103e36c73d85a09876cc8f041963ed131af18d4bdd5c6659a60fa73a900ccc17d87b9e14aa803126537ff345f6aa67277cae9c994671