Analysis

  • max time kernel
    120s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 04:48

General

  • Target

    57f3f5b0235adb12f5800d54d6623640N.exe

  • Size

    42KB

  • MD5

    57f3f5b0235adb12f5800d54d6623640

  • SHA1

    f46c2c673c4b9039cd876bfc3befb30aca86a849

  • SHA256

    83c65401b85611ac97c155d92dc9c2c48f70096675f5b50f283c57f26469fbed

  • SHA512

    b8c87a619c580a3925114bc58ef892ebf9789ff2496ff6f180a2e613a3f00f1266d2e1662149a1c143b58d88f3f58d925b0114939b837d296228d716b7287325

  • SSDEEP

    384:GBt7Br5xjL9AgA71FbhvuNBN10wpAp/lvolGClvolGwTCus7sczBo:W7BlpppARFbhbt7Y7wTCnBo

Score
9/10

Malware Config

Signatures

  • Renames multiple (439) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\57f3f5b0235adb12f5800d54d6623640N.exe
    "C:\Users\Admin\AppData\Local\Temp\57f3f5b0235adb12f5800d54d6623640N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1412

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

          Filesize

          43KB

          MD5

          274164a34d8c7b4ff15dae1df44b915e

          SHA1

          d3929cdbb85260b50a2d185681953bba669a8e08

          SHA256

          d9856ca129cb33dc60ae9757f023404956f0391363535e96c49f0ec5050cd5d5

          SHA512

          c2896d1d089eb0d5b9fb9b4e04fc33c1b1b2efa09352c54f9c1ed016d10baa657d3f2c28df66e55955c7647055543f7b282eb19c31275bfa008f4008dbc689d5

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          52KB

          MD5

          7808e17ef84e13978466281b1730f702

          SHA1

          d1500bb5993b26faf8010063d0db298846869dd6

          SHA256

          1b8a5f9e68c88c319e2de5c7a5a7e68094916ddfa5e5a3cf252f24c4bfb5af4b

          SHA512

          5d73a16e4ad1105ad86ef4c3a821a0987ba08ada706a6717770c3fc6b062cc8d5240374236e119dae8d8164259ca374336980fd2d7e7c35298054e359b33d0dd