Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    16-08-2024 23:08

General

  • Target

    614062c4babd45f6c6e3c57555999a80N.exe

  • Size

    44KB

  • MD5

    614062c4babd45f6c6e3c57555999a80

  • SHA1

    fac451e9b71f3a5dcae6be50327134285f39607e

  • SHA256

    dceab3e1016638a05b0c34b71a5c2df70b77e0758771892cea638761d40e382c

  • SHA512

    4e40b0d0a719912d4a876e7569a6f3d14e803896c073dc18c2430fca46c0d27fab0bd5349bf31200d941a1d80b68ff79742436a9b3a60159115b6632794d462f

  • SSDEEP

    192:tACUADIY0Br5xjL/nznlAgAQmP1oynLb22vtI0zWXPXj:GBt7Br5xjL7lAgA71Fbhvt3M

Score
9/10

Malware Config

Signatures

  • Renames multiple (3248) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\614062c4babd45f6c6e3c57555999a80N.exe
    "C:\Users\Admin\AppData\Local\Temp\614062c4babd45f6c6e3c57555999a80N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2332

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini.tmp

    Filesize

    44KB

    MD5

    a3d930502afd9a1cf4323121c303f5f3

    SHA1

    ecbfc18cc1d0e4603bd72ebcc2c779fefc258758

    SHA256

    6038dd1db8e8642a056139ec731751cbb43ab9361d5339ee5756e281f6c38c92

    SHA512

    7d2cf9834c498532d461d71a9b838c0d9255dac19700eb37d61a32bc9257954eacc0c76178ddab3b8a313aaf1fd6bd934ecd47d880b48beb1988d3f3241d3173

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    53KB

    MD5

    4587e9e05f22931205726af71ce484b3

    SHA1

    36c88e8d1228001d93400a2eb44f996486524c9c

    SHA256

    cee85c879f4512d27a973e7ec279d6af18e2c1a01b6c58835c6bd027d5aa79b1

    SHA512

    e3a12c3274b4e864e60e3ca47944c1a3148697e8ce776055323c793ad8a3ce37b745eaa15e1a546e60cbb8dc15fac777da39900b7be5fc3ae5ca4e213b46b962