Analysis

  • max time kernel
    119s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    13/08/2024, 15:40

General

  • Target

    74d19cbe05579471d2f6a03c81c48530N.exe

  • Size

    106KB

  • MD5

    74d19cbe05579471d2f6a03c81c48530

  • SHA1

    b619bef05e15c769bca4a0ce7f572dbfe908aa14

  • SHA256

    f863dd99a6e517eff186236a8eb69d8c4bf1ad1e622fcbf0c03e1b66b82f3892

  • SHA512

    fa554634e29ab245b6c0983ccd8581fde7bb62baa5cab6d26c84f7c321b8a89f6844441200a8c0d5eb4349c6c5e28e97c68fe730752bbe65500d41412d3bada6

  • SSDEEP

    3072:6pWpUFpEhLfyBtPf50FWkFpPDze/qFsxEhLfyBtPf50FWkFpPDze/qFslEhLfyBi:PqFF2Ie+efsim21

Score
9/10

Malware Config

Signatures

  • Renames multiple (2842) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\74d19cbe05579471d2f6a03c81c48530N.exe
    "C:\Users\Admin\AppData\Local\Temp\74d19cbe05579471d2f6a03c81c48530N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2092

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

          Filesize

          107KB

          MD5

          41056966f216e7cc5d96cd5d92cf684c

          SHA1

          d6ba34246ce37b81e12178c363d0ed1c6c6a4c98

          SHA256

          a8cfdc2eb816d07a00b8ab01027b7803c9aad343bf143f2e41fab2471d3c50b8

          SHA512

          b75a915e57e4202a1df0100de1da3dd4c7df554dfd30a5dcc9e222d53f61ad53017221a5c3d2c1c114762af6146535b610998e7c74e781b002d3c427c962c71f

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          115KB

          MD5

          25d761f3c3f98d6b726c0ee112776a0c

          SHA1

          bd0f8cbf9c03c33c4766c2b47bb6e47a96e041c1

          SHA256

          3ad5b20c5e1668d7583ce9449a57f3d1d7fd5113160ed892c9f022ba9991014f

          SHA512

          7c3ae26bf1e9dff7fb891636beff686d0ffa2b28a74ab6b95de55e9e7c4627a9ee34a15a65ab724514fce0c03eb641cc75bf85e76914b722c0a1f09307ff1754