Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    27/07/2024, 02:52

General

  • Target

    8481aff05cf34d06cbef2bda80792700N.exe

  • Size

    35KB

  • MD5

    8481aff05cf34d06cbef2bda80792700

  • SHA1

    fa6d71acf727bd759cb8b272688cbbdfe64f89ed

  • SHA256

    670a36b1a8ec36e4242082a11df51be3e5ceb191abae7cc688f5742e2e29bd83

  • SHA512

    f6d76f62da99480642246f4cc17032a4f3beecb7405b7011342e06be82f4d2c608fb160480f7a2a32e0ae79bdb822551dbb2c875dc36a142ec24ddacaf70d45b

  • SSDEEP

    384:GBt7Br5xjL9AgA71Fbhv7bhvYYjYHbJQJbwXK5c5Llv6Wlv6d:W7BlpppARFbhjbhQYjY94OK5c5J6a6d

Score
9/10

Malware Config

Signatures

  • Renames multiple (2901) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8481aff05cf34d06cbef2bda80792700N.exe
    "C:\Users\Admin\AppData\Local\Temp\8481aff05cf34d06cbef2bda80792700N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

    Filesize

    36KB

    MD5

    9a5531b8bdc56ba1723778be6c2fee1d

    SHA1

    bd30be0fea9f621141fde28e967f0f86c0909f93

    SHA256

    500f2eb0b3bccbe2c53f2b28414b1e33b5045dd02ec62b7bc340d2803e03663f

    SHA512

    c341f9a15b11ca4c106e8cdf0bbb2a27c7d3e5f0858ad3c6e3eacaf02186f102604aaed4bde5d6c59a0402eb3ccc7d3b3d3663ad7a2c64ecb3e8c66a609af76e

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    45KB

    MD5

    64d3950584f9892950fa60e2d0788b83

    SHA1

    95d80f8ef8f4b3aa6760d8386ce84d84d5846dfb

    SHA256

    fbbe74f27a8f5bf65b0cb3393edd8d6b9ba1405d12932439664b6fbb6fd74dd1

    SHA512

    886cfd13974ed124f6729f01be43b69d682c3af0f6964e5e5b498dc3c6e40e9800006b99713505476981136a64dafce8505ea53a5c795dc29d71a1b1a62a524a