Analysis

  • max time kernel
    116s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    27/07/2024, 04:07

General

  • Target

    8e06517b38eca6c66be7e4742caf7d10N.exe

  • Size

    38KB

  • MD5

    8e06517b38eca6c66be7e4742caf7d10

  • SHA1

    203f6095231e8fc14a5d47d3c25950758120e20f

  • SHA256

    69a247951252f48a5de56e28d0efe0bfa8c99c15da91c3795d9247dab490a58a

  • SHA512

    3d7f3d246f462576f75833dd0315ae2ceb8514d73408c47da917a8cc52cb60696c6634f2bff2bd0b29ec337a1a8612eb2e1728163d831209c2548fcbf5047560

  • SSDEEP

    384:GBt7Br5xjL9AgA71FbhvuNBN1qmq4Gqmq4MAAAJOQAAAJOwjyjuc:W7BlpppARFbhwEnAAJ+AAJbjyjuc

Score
9/10

Malware Config

Signatures

  • Renames multiple (228) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e06517b38eca6c66be7e4742caf7d10N.exe
    "C:\Users\Admin\AppData\Local\Temp\8e06517b38eca6c66be7e4742caf7d10N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3012

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

          Filesize

          39KB

          MD5

          a0e247d6755e6d222bd174959fba6cf0

          SHA1

          39d5935d7510356b9d8ba2c61246b53892b44dc0

          SHA256

          e86789fe7d8ac229bb7bb3e12288d72f08c7ccc4d60a67dea36a8f114a6109d6

          SHA512

          800253753faa5b1780748da0032708bb9f5124dec4527f804c6f67f942170a9f8978005daf116e07b7cdfb775f09750187b6373623ba8eb5431877224c29e138

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          48KB

          MD5

          667d63389d927587480c5a654d051cc6

          SHA1

          5c693b47ade664402dca0793a8ebec3d28672f7d

          SHA256

          92f1c269cd9cc993f0672adac94034aecd48ef5a9f9f381eab646711756a6c79

          SHA512

          a0e054e60b316a07cc536ba89c583ccff61c2c09be9f290ed56176756b0519da37ed23d5a624dd0fe93e5144b8c92b3e12e18b7b09d5699418eef33252b85908