Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    13/08/2024, 17:36

General

  • Target

    04c59ea1ff63ead5d4d162dd8df5da60N.exe

  • Size

    60KB

  • MD5

    04c59ea1ff63ead5d4d162dd8df5da60

  • SHA1

    0f8c215570b891cf07400bbd00eb0beb012bf85d

  • SHA256

    a3aec86af1962771437b60c5d9b56eaed27b884993ceb413c49b732b7c3be930

  • SHA512

    1c071f34ceb798749b6ddfbd8b47aac3d70ef2c0e9a6176622ecb375e73f8a4cd539a27225dc1012128a04e6a5abaad382941ebfd3e210d9492bd0b56aed046b

  • SSDEEP

    768:W7BlpppARFbhknrAqQ/Q6JYAJYMMF/2AxXxX5Tv:W7ZppApktshJYAJYDVXxX5Tv

Score
9/10

Malware Config

Signatures

  • Renames multiple (3194) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\04c59ea1ff63ead5d4d162dd8df5da60N.exe
    "C:\Users\Admin\AppData\Local\Temp\04c59ea1ff63ead5d4d162dd8df5da60N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2608

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2172136094-3310281978-782691160-1000\desktop.ini.tmp

    Filesize

    60KB

    MD5

    dd4a122827a004f157eede6bc5b9501b

    SHA1

    8f7eb456c606e49bdbb72f67a5c5700bd81d8081

    SHA256

    5b18c613ea1ecf77a5e896a539dd6d81d8458cb5f41b0d6490e794517aabc2bf

    SHA512

    86f3df16b589bf7f912bc2e48c102ff8b62eb9d917ee15a7ee1df444901a3fbcedb945bebcf4c2e26802c18dbb7a9631ca15b57b930ecf14fe4d152bbcea5ad1

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    69KB

    MD5

    551ff284cbb3302af43ccd38ee3fe418

    SHA1

    294a2439d2f12367c1595502170bfb87bdec8575

    SHA256

    fa400ebd886b93e359c697415d3306ff7b134694fbee7159a066339bc94eae0d

    SHA512

    944dbf29700eb0a4326949a54f4e9048661b2a1401201d26026467b68af15403783b9f0be1487b552c141e34d116f3fef7ae06beb390a8dc5920bb5e73c35029