Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    03-08-2024 00:50

General

  • Target

    27f792b5c75995cf7171f735aaf31660N.exe

  • Size

    37KB

  • MD5

    27f792b5c75995cf7171f735aaf31660

  • SHA1

    ebdb1dfed136902710fd0e207c8f54e4e1e17599

  • SHA256

    5d11f38c1f79bec81847f6bf43bddb3ce9b524b3faf5985233d77f50912a753b

  • SHA512

    1fddc31968dc07d33d88490b1936c89e31a6695f1d925fc656ed139071485f7d477c05e1a514b3d796bd9e8a7bc5873159aa40d14f9201d3f08e25aaff5b88e9

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42Lcfpb2N231F1h:W7ZppApBULcfpHLcfpSo3fP

Score
9/10

Malware Config

Signatures

  • Renames multiple (3214) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\27f792b5c75995cf7171f735aaf31660N.exe
    "C:\Users\Admin\AppData\Local\Temp\27f792b5c75995cf7171f735aaf31660N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    37KB

    MD5

    a7bac0e981af63bbdca4f0384636813a

    SHA1

    9bc61a09d7a1918c47d1cb16538d52e52b12d698

    SHA256

    32367e787136920ff71e6aafe09d5abe53e5d822b240f84edfdd4517cf262917

    SHA512

    b8311fea5412242241f091d6da7d74b177f5820bf08522bdf6edeaf852b516a6abd7147ebc63d29b9dfd1bc8ef04fb8d3cd2a9edb8c2c720cbcea84ad161d8ef

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    46KB

    MD5

    8544111f3a0b59b8e081253e1d50e001

    SHA1

    ed669acc91d925470053d0ddaf204a093bc15a79

    SHA256

    8bd6be7546ff8ae032c1404f6c8fcd050131cc7e6615d016dd8ab07efae77c31

    SHA512

    c90afd1e867847fed8d95d07084e82f8c53900cd0e9ba18ae075477dde15b200974c4edd25de343e6bacd32d0b3b8e732e9c996bb53b30af2a9977f33b92e082