Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    01-08-2024 20:46

General

  • Target

    02d29a089d89f9a1a0d3a63aa261d400N.exe

  • Size

    106KB

  • MD5

    02d29a089d89f9a1a0d3a63aa261d400

  • SHA1

    e00d36052dff1a64073227f78bbe3090b467dc18

  • SHA256

    8776b97a486543584a6a4008e43fa31da3dfef867ac15b35ea5108f07ec133d0

  • SHA512

    a753cb5b8352bed1a8b01976f3cab47470d8524bd09cda8478e8360871ed3b16c049b2167602adc1465540229e79cb7111676e0aa94dfae0bba83508d2645c86

  • SSDEEP

    3072:6e7WpMaxeb0CYJ97lEYNR73e+eKZOf7fHegeK:RqKvb0CYJ973e+eKZOf7fHP3

Score
9/10

Malware Config

Signatures

  • Renames multiple (3181) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\02d29a089d89f9a1a0d3a63aa261d400N.exe
    "C:\Users\Admin\AppData\Local\Temp\02d29a089d89f9a1a0d3a63aa261d400N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    107KB

    MD5

    0e3670bd92c91d2418522de2ecc51ce0

    SHA1

    0b87d3595f45ea0463269831c9598496797ce611

    SHA256

    59560c5eec08ff199062a0811ed935cc9b6455db8297d40f72df4948c00d91e4

    SHA512

    87096b557f7accea3c6682f99b7077b66052e52e1373119e16bd8a4a90237d8d03ca5cdeb9ca18e3d1d2c61fac5affcb1db9c4323bbd345f23e885dee6c28490

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    116KB

    MD5

    6242b4127aa326714ac3a1fc4949e2f4

    SHA1

    f32c7cabf64a2052759654a41d959248b1934f4e

    SHA256

    2cb6bed9bc93c4cb4dfbb526a6d254dd7a4bfbd85f1bd3cc88242041be944394

    SHA512

    973e18caac39d4ba4b56145b4844056e94032aad783072636d0ec3538b74ada712f7d0ffb4b8c8edbad139e9b564991deff3eb31b9b90c981b1a95860aee927a