Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    06-08-2024 03:52

General

  • Target

    5574f6929ffb6a525059837d1625c350N.exe

  • Size

    43KB

  • MD5

    5574f6929ffb6a525059837d1625c350

  • SHA1

    d99579728736612cf2da15b5172410ce376bc4f5

  • SHA256

    85a9ac4b8e6d74283f95f2b0bd2d775369e5e2dafe4c7136a201f6445f481df4

  • SHA512

    f2d9827017ea2c537a821c8945e5e8c5a63eeb3829ffd6188caddbbe1ce5be684273b3fb6322e346e653b23c13864684d6d09688f44952afdf9c98457a9d34ba

  • SSDEEP

    384:GBt7Br5xjL9AgA71FbhvuNBNQFrs0AqAJwO1AqAJwOfF2JouP2JouQw5A5D:W7BlpppARFbhHFoqAJwBqAJwRJofJoTT

Score
9/10

Malware Config

Signatures

  • Renames multiple (3249) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5574f6929ffb6a525059837d1625c350N.exe
    "C:\Users\Admin\AppData\Local\Temp\5574f6929ffb6a525059837d1625c350N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

    Filesize

    43KB

    MD5

    498bfe08b541e84c57a516bb0d595610

    SHA1

    3099815b816900164e919791ff6f09276f65693f

    SHA256

    bab6874e22c05a325af4d21569e269c1f092f3677e72b8b95c388dc51607b95e

    SHA512

    1a6748dc69e08f3b31868124d2d176d42fdd0bb73cc59d3036ea0f49188b42aadacfb233e5dacd867c9cd63521ff94db75ec43c3bb2d4370a6d289a89a855396

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    52KB

    MD5

    6e2a90fcf6ca2fef15f105b337b48635

    SHA1

    d5cb7f127e5bac2848da6de101fcc299c8559c96

    SHA256

    366d5f2f8002c206a08b84abb392009328ddbc757004566d77c1b40a8f4778e9

    SHA512

    b11e34de4fdd706841439224fcb90d72c38b6711325dae01cbcfe2bfa96c92e62eea5fa39086413ce610673639e2e54484a8027c967dfe0f5aff4ce3b1ac17f4