Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14/08/2024, 17:32

General

  • Target

    f59194089f7ba71d020afc2e378f7c00N.exe

  • Size

    42KB

  • MD5

    f59194089f7ba71d020afc2e378f7c00

  • SHA1

    b26969be2f7f4874cd27d549ff5ef0c840560f93

  • SHA256

    93b3dfeae526ce535c6ba73ea064117614c6305a9b2452585bd0e24e59147f90

  • SHA512

    f128f90fd7a75d5c25f33e1a9f6078fa8352c57a0c22a85c3a7064f4ba0fef52823e4e7a8674f3d6e85a30e291937cb1b003606b7930250c5dd04f2db36b7695

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfpXfxRfxFHtHR:W7ZppApBULcfpHLcfpXfxRfxFNx

Score
9/10

Malware Config

Signatures

  • Renames multiple (3292) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f59194089f7ba71d020afc2e378f7c00N.exe
    "C:\Users\Admin\AppData\Local\Temp\f59194089f7ba71d020afc2e378f7c00N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    42KB

    MD5

    c06c722fc8269155d37027e460599b75

    SHA1

    12844db59de7b5e54ea4bdc7aff4e4a14c94abd5

    SHA256

    321f284e1934d441bcf67d38bf8a3b2af3c42507d7bbe659b7fe9b5995260783

    SHA512

    833e81d4221fccc4faecba33df7fbe7bca773e62acadee39b71525d4cb5669aa3c3bd571eacdd63508e46548337bafc0e21807c7bd468d0ec7f64313c5938675

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    51KB

    MD5

    f77aa361eb3ed4e9a682e7931b2788ca

    SHA1

    064706be6f0198f503bba3564fd3491932235b12

    SHA256

    4b1467c6d5f823e54db8203682c7cb9f9945777c94b8f09c2df4190e80e32d0f

    SHA512

    02ceb83d1e0f05a42e829c79ef145ad66366647257f76193102b36dbbf2d08ec45c335821dc413a71dd81bb429b6cc054973995c65c2a11360bc94bf290bd4dc