Analysis

  • max time kernel
    119s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    28/07/2024, 01:57

General

  • Target

    337b417fcebc3475128fa99f9b6bb680N.exe

  • Size

    38KB

  • MD5

    337b417fcebc3475128fa99f9b6bb680

  • SHA1

    43edbfe9a23c6afd9b938ab346b2ed7bfb8954e7

  • SHA256

    f49b607bc53c21676fcfbdfb0e0759fac216fb2816920e9c1fc7462b583e3df3

  • SHA512

    587977e4bcba531ffd7d961ae4c7f1f80111bca8ef5a20f8d31a96b7afd9f57a639976e3e453c6be25267bfd8db140efc1bf30611b685f6c57885aafa53799ea

  • SSDEEP

    384:GBt7Br5xjL9A7AgA71Fbhvnqj7jU7ubTAgpbuvx10AaIdKB7ubTAgpbuvx10AaII:W7BlphA7pARFbhL801VvM801Vvv7E

Score
9/10

Malware Config

Signatures

  • Renames multiple (1952) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\337b417fcebc3475128fa99f9b6bb680N.exe
    "C:\Users\Admin\AppData\Local\Temp\337b417fcebc3475128fa99f9b6bb680N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

    Filesize

    38KB

    MD5

    28a17fb12875272d709d2773f289b940

    SHA1

    b9e2c1d71c38e594d360f1421ec960036fc71443

    SHA256

    92c8e5853c3236133a78a53ff16f25e0b4c688af414dab9cbb6b10e7d61e37df

    SHA512

    d6d2c3709adeba3247955fee8ee5a35e0d5f0293253c00de3b0d462d0b9c2a32170481cc148c1d68d411f5580f15e15e8ac7b7503e83e9f6265697368a62fc27

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    47KB

    MD5

    ef71d8632f189271478c1cf9a7e35504

    SHA1

    2655fc4771071130bd2090683ef9c0e4353a391e

    SHA256

    53d8358ff132b6dc972015813d5de346a3cc9ae47794bba85bcd6b2ecc7e2550

    SHA512

    516d0fee6fddd431e4cb923e1ab006436a684f3deac8db4f6eadaa8a40540a5fd4c3356f2e8b234c870f45b1e3e377ca122ff9fa43ba78abfab82fef95597da8