Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    27/07/2024, 02:40

General

  • Target

    82e993225f94b73cd67afb12b372e5a0N.exe

  • Size

    81KB

  • MD5

    82e993225f94b73cd67afb12b372e5a0

  • SHA1

    8eb068a286da6299a8ca3dd7091f439006098268

  • SHA256

    8258440aca5b4f6ce780cf6ba0a525f483a1b50c25a7179c8837a2433734ec99

  • SHA512

    6d53d09d0da7782f2631c6590da6b0a00899fbc4d2924bc1bc8268579e5092128ee307bfc4f33c2d68cc7e450114fa3aa75d4dc43b23ae1a5d8d687035a9fd1c

  • SSDEEP

    1536:/7ZQpApze+eJfFpsJOfFpsJeFrxFrZY0Ql:9QWpze+eJfFpsJOfFpsJ0rDra

Score
9/10

Malware Config

Signatures

  • Renames multiple (2161) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\82e993225f94b73cd67afb12b372e5a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\82e993225f94b73cd67afb12b372e5a0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    82KB

    MD5

    43254df5fbbbaf28c1f7fc4e8454b9bc

    SHA1

    451beeeac5bba94a379889e54ec1a75794e61dd8

    SHA256

    87d6ca20503ac61f38f03bf9243cce400baa25327adcd0b0cfac62b76090307b

    SHA512

    6e1d4ddb1216c8258c88ded307271578b430a49cd8dd988c5281dabda2267d63ff6fb3ae021946c98a181dab80428c79ba5953f69b1004488787086fefc91ac2

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    91KB

    MD5

    d0dbe982c6aecbfe353fe99300444728

    SHA1

    d5c8aa2803b44de60142916da14a328a3ba74cec

    SHA256

    a6bc50fb249f01e39c99f6cfa64db7c8cdb9c3da2d2360914f125212cf33f9ba

    SHA512

    79d2ccee8dd7ff9f6f30f9a980e5203b8c3fdb122c038a138c2a938af5f3605184fd3e2f93b58293a71de44ed58795725f5c5566f75f618ed69d683914a2c066

  • memory/2360-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2360-160-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB