Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    06-08-2024 23:01

General

  • Target

    223bfc2da55037a567f0beb7d24015d0N.exe

  • Size

    49KB

  • MD5

    223bfc2da55037a567f0beb7d24015d0

  • SHA1

    5926903263cbe735b2d8b246471c7eae7c1a8d1c

  • SHA256

    f33bf963027b08c5961cdd455300a5fd91f81c8e45f4513d9cb527f025be56d7

  • SHA512

    f6bbce5bf5611f6c6e29e11fc063d7c5b5c7511058fc0fb42ca672cbd510765be7b5a5e1d0dbec2c52a2ab89f90a2b922d3fa1d92678b6be4c52b330d02b340a

  • SSDEEP

    384:yBs7Br5xjL8AgA71FbhvBfepj3cfepj3KtLJr4S04SCzwzdAsAbJOkAsAbJO1:/7BlpQpARFbhq1KX101GIesAbJEsAbJs

Score
9/10

Malware Config

Signatures

  • Renames multiple (3169) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\223bfc2da55037a567f0beb7d24015d0N.exe
    "C:\Users\Admin\AppData\Local\Temp\223bfc2da55037a567f0beb7d24015d0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2257386474-3982792636-3902186748-1000\desktop.ini.tmp

    Filesize

    49KB

    MD5

    f497e505430fc631b3efe5229e406a05

    SHA1

    2601cb4efa3e1f582f3bf125fad733f0381394ef

    SHA256

    f894a6041c12a13097992bb30c5d72a6c449e9129f03d0576bea77e49d70f5aa

    SHA512

    d30e9d3e0130f52978979efdf3e1da2b6711801ae92339daec23cdbcfc00d6aba73a235e9e19a62426dbd286731ef357d2bde898ded8a440a9c3d3b06fc13b2e

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    58KB

    MD5

    76ec3a4bdb04f8655a07e750e71be52f

    SHA1

    544426a4d398e6b5df224e8a95dfe3af8bca41d1

    SHA256

    bb236e035c834e25705745883847c77a99045872f45bae8af3220217810813fa

    SHA512

    63fba8e5b5540bef4ff525719f434ec85004ddbd1b554edea8bcb9cc48094e4219d11b36f997090fa68edc9c88bda93250db64ab88efba076e25697eb7259920

  • memory/1316-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB