Analysis

  • max time kernel
    120s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    06-08-2024 08:31

General

  • Target

    828fc3c2ebeaf0fb3b58109ddf9c3d80N.exe

  • Size

    135KB

  • MD5

    828fc3c2ebeaf0fb3b58109ddf9c3d80

  • SHA1

    0f753b9f39f2dac6b34b28d7e14fc76532bb2021

  • SHA256

    7ae5041f1b1e47105bed48c1a7792eee5ab0166b53f478540df6860c1e564525

  • SHA512

    a118edc1b807002116abcd1200badc147ac9b547c2068cf900f44454d813b1a8d3fae1fdda8ee5aad3a3fb3e86764c88f4e9938bc319759f91dcf806ba5c3315

  • SSDEEP

    3072:6e7WpHIyRF9ESWu0SWuDmSXrw3Mtr0s8P43C:RqlIyFESWu0SWu2s8P43C

Score
9/10

Malware Config

Signatures

  • Renames multiple (2661) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\828fc3c2ebeaf0fb3b58109ddf9c3d80N.exe
    "C:\Users\Admin\AppData\Local\Temp\828fc3c2ebeaf0fb3b58109ddf9c3d80N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2780

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    136KB

    MD5

    3ef61eccef7adf9e187eb917525e6b03

    SHA1

    bb6c192232596aaf4f651ce8c6b30d17837b92db

    SHA256

    da328cb160d3dcab2d58043c8d7fc566e6407c1ac71a6043ed2f0a81ac72df7a

    SHA512

    9e959525c5357854bdb7cad067768d2071eb7caacc113f70ce289943e7200bb6f5954f01ee48d3112ff13e584300d5aad8ea3a16b109432822279e227c114c41

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    145KB

    MD5

    8686ab856ae3b8b0fd0c3dae81336cb0

    SHA1

    2cb5d4f3186b8c5dd73ef8f0f3162044b48d1018

    SHA256

    32f3fd0dbe65e3d60cd30f55824d8b8a0b1d14875f87a88b53fdcd7c3a4cfa9c

    SHA512

    40962ce2e6f2e904517f83c79cf3c20eb81b8bee569bce2ee111fcf2977f0c160a1b2a9061cd5aa3177203642ca3188e423facd571ea3ccfbde8762197b9f766