Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    01-08-2024 21:32

General

  • Target

    05dc75df6b6003433198a4e4013a6920N.exe

  • Size

    65KB

  • MD5

    05dc75df6b6003433198a4e4013a6920

  • SHA1

    59f85323d4af60ebf7fc32240b25d496fd45bcbc

  • SHA256

    296afb3c1ad2c58aabd83d348b6f1c4adc8135194e84ea6e9c93250974af3b66

  • SHA512

    29c2e5460a6f13621377a53922b7c9dd381e4e3b55fd6c46ff276437d74b13f846315710a1853021fe5dc9e814610ea05b306f75840401aa94c933ca2bbedf64

  • SSDEEP

    768:/7BlpQpARFbhWGLF/MF/LEXBwzEXBwvqJFqJr4s4p:/7ZQpApP2I+m

Score
9/10

Malware Config

Signatures

  • Renames multiple (3164) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\05dc75df6b6003433198a4e4013a6920N.exe
    "C:\Users\Admin\AppData\Local\Temp\05dc75df6b6003433198a4e4013a6920N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    65KB

    MD5

    1ce72182adeda30a5c74f73e4774d193

    SHA1

    62b22c26ddc441ae576ee56ca79f0ddef01db04b

    SHA256

    bd6b13c39d18f829a18a7b0180f92a8fb130b956e6c37a3a7e6363046efe5715

    SHA512

    f91d4fbad4373d76426c0a22eb7c4a231e0f46004f2387e74ebcc5fa140910dfad1278bdea3657c66f03ef0dd33c0c321e2724df28072e5ba82faf5025a6f38d

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    74KB

    MD5

    fce904ef4131ec90418d4fe771eba52c

    SHA1

    212564c790041fab671759b78ac6c626feb38360

    SHA256

    4dc19d34bd7dae064aa71c053702a1531bee344d99e055e93f2de9ce2a5eb26b

    SHA512

    0c8deeebd8a1a9673ad0bfa0fc9bd49a86e75868e4e1eebf5433feb6120717cc7c4408eea206066ca314274c92235e6085e052e6cd4f39e62e0a55652c74f440

  • memory/1952-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1952-660-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB