Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    27/07/2024, 05:33

General

  • Target

    997a54ef3b0699a5fb43aba0925f1d70N.exe

  • Size

    40KB

  • MD5

    997a54ef3b0699a5fb43aba0925f1d70

  • SHA1

    72eb1bded41be78364fa347027fa31580e4e5f3f

  • SHA256

    a097dd40c7eb68db26315413e0c5c86977489afc77b92ebeb66452137418628e

  • SHA512

    7f79250925c87b1702bd237cb465c28ef472d4384c4c55dc8bb2b2f4d58cf83eed93ecb0163f955fc28bd4203a367116397787620e1390cfad35d9e0f0125ea8

  • SSDEEP

    192:pACU3DIY0Br5xjL/EAgAQmP1oynLb22vB7m/FJHo7m/FJHBDPeLS9I/sExeLS9II:yBs7Br5xjL8AgA71Fbhv3UnUN

Score
9/10

Malware Config

Signatures

  • Renames multiple (2160) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\997a54ef3b0699a5fb43aba0925f1d70N.exe
    "C:\Users\Admin\AppData\Local\Temp\997a54ef3b0699a5fb43aba0925f1d70N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2980

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    41KB

    MD5

    69fc15782c20d29eea8683b1fb62f2f0

    SHA1

    1e135260fccd435e8c7ead60904fb2b4011c4ba8

    SHA256

    d88956ba5d67eab75209764caac61be6d43654532a987cc92f78236ec210fa8b

    SHA512

    0ff0a260cffd750f5107f2490897e774d422810585c9dea28dcb9134b31ac8164a5301f72f856c4060f475b3fb33b0fb6886ff20408b86f508e21f5928621ec6

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    50KB

    MD5

    ab63d4bc18d7c649e33063d0235304b9

    SHA1

    3a43b8249a337e83e89c23699cef7c47654bba92

    SHA256

    8f5195a8bee21559a887475f5160de06438bd1118cd305b7409373b7c615f22d

    SHA512

    085cef58bc4e0a67780b76f83aafdffeeb64af50974adc19ed66d0458dffc91e41d04f51b97a1260838e2e04d33ba2fe1b779b5f43b825046c8048360fee09c8

  • memory/2980-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2980-124-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB