Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    14/08/2024, 13:43

General

  • Target

    705b2be48b2c398c80f195d1ffc72d90N.exe

  • Size

    40KB

  • MD5

    705b2be48b2c398c80f195d1ffc72d90

  • SHA1

    8a0424a8ebd55cf8830ecbce7ba936783c732d67

  • SHA256

    0b8b97009c2c4da5f71e85daf6524723d555b130313178493ac6bdb1a38f25c3

  • SHA512

    ce40c56ae1a99684bb87f9145614e99652d42e9b692415d727c0b9b89a68c8aaae04f1d1a6c203b3e497c06441ff6aee3a26e65d63b0aa9e4ec456acf6985751

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42Lcfpb2N231F1H:W7ZppApBULcfpHLcfpSo3fJ

Score
9/10

Malware Config

Signatures

  • Renames multiple (3297) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\705b2be48b2c398c80f195d1ffc72d90N.exe
    "C:\Users\Admin\AppData\Local\Temp\705b2be48b2c398c80f195d1ffc72d90N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

    Filesize

    40KB

    MD5

    12b44f596ab92f5c04c092de790e6867

    SHA1

    df1f4d2698b3a397996112208915f95d526dd1b5

    SHA256

    ce3b5ca63294668095c4ffdb1bb3a9cf2af6c0ea3aac257968a8454001c1f747

    SHA512

    7a61ce6faaf8a0ad75f01a78d71c9611151572e0aa4946dc13afd6586f338806eb64c4a6d7d30e265112743561a804c7462bdaaeeb781486eb82013d98871393

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    49KB

    MD5

    a1af4215af20745d2ca206e5b2f7ba0b

    SHA1

    4526ded081604b3ca6794bb136036ebd018c846b

    SHA256

    e478fcfed9316788cb921d857bfafceb92c804cea9eb00a584e22fedb1811e69

    SHA512

    b9d7a73d2729c8ab6b1dbde0fe34c022615c3d49f7cb1ec80ce61bde90c951c81c4c18562b52cf416e931c8943f7ee8db15feb2e491ea856fb75e857caa44342