Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    13/08/2024, 18:08

General

  • Target

    2c06c03ff84db5a4cb26a3bbe9d56680N.exe

  • Size

    41KB

  • MD5

    2c06c03ff84db5a4cb26a3bbe9d56680

  • SHA1

    ab47e82522b6effaf2e7b6326994507755613cad

  • SHA256

    a5ce8c826086274c304909b3f7fa577fd4cc3c1ffa91041d9eefe44094c92d8f

  • SHA512

    2c7024ce593393e25ce0bf36dfc2488fb188842af3bd5cb03f9c213e8295e091122774d68aa5a6468ad83abfa8a568d27889e8f955ef15dc80f81d2e90dcafc0

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfproFNFi:W7ZppApBULcfpHLcfpyDi

Score
9/10

Malware Config

Signatures

  • Renames multiple (3276) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c06c03ff84db5a4cb26a3bbe9d56680N.exe
    "C:\Users\Admin\AppData\Local\Temp\2c06c03ff84db5a4cb26a3bbe9d56680N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    41KB

    MD5

    c3ac97f240787125266429fe0865e541

    SHA1

    3a47c6c4cca5939e42625b33a24770b797f9af3c

    SHA256

    939dab1de9a4a70c3e97faf57ce7fa73ffb5ff85668a635b16f1ba8b62cd77e7

    SHA512

    f39236c5d9efef386fb5b0d702f5add7224cf2c86d4499c70902388d4ad3840a6c96aebc172871a811d2e915a3fea913ae917cdc1c68b78edbabb6c10e78a37b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    50KB

    MD5

    057aa2916f6003aa03e5a80d5ff08278

    SHA1

    33799a9785c79b88057cd98d683e98c82605c6b2

    SHA256

    a3f3f455a504695e49bef7327d53d08595ed3b7772728c74fcee7c8df61efe17

    SHA512

    e55ffb063e31d1677282d2f8880663a720ba01cdb4c3880c8252861ea9ab75ce483d8c5df9be66dd7809a97bd23cc818269ff61136de8bb876e2d76696db1f2e