Analysis

  • max time kernel
    120s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 05:04

General

  • Target

    a3a530839ef8703daa8077e70636e690N.exe

  • Size

    42KB

  • MD5

    a3a530839ef8703daa8077e70636e690

  • SHA1

    556ac8a526c46002e5f227907cb30e8e1d865dfd

  • SHA256

    f05da185d3f481a1d52a9cfed2fe4159b9f34b0f2e0d790a60b7be261ad0cb12

  • SHA512

    860d7330eebb549c91cd523b4fa89a1ec473ef9010872140d2e4a99cd3d01c96656c1b9bc8340eca847f045f256de5f550f2e6190456068ea5373268bd776f1d

  • SSDEEP

    768:/7BlpQpARFbhefnj0Tjfnj0TPuqKDKrvPf:/7ZQpApouSvH

Score
9/10

Malware Config

Signatures

  • Renames multiple (3418) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3a530839ef8703daa8077e70636e690N.exe
    "C:\Users\Admin\AppData\Local\Temp\a3a530839ef8703daa8077e70636e690N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    43KB

    MD5

    2ef683d01e5d656e22f147bfd6a3ea58

    SHA1

    f4c253180d6f0a0e9a6ee2827da29d38fb677352

    SHA256

    8d78ae1d40c2b74fe2b119527564d1e57b075a08c1991ca019bbb8d37b0b1059

    SHA512

    ed0317c295a5ab94b2395e0e40b818136b344674508f9655d54c52c67ad87bf9a9e0e72d88aa56f5258f4cc75e7503e5a07a2c33e91d7d92662f6f4591b7cc38

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    52KB

    MD5

    028034f3f9a144045296836f627af288

    SHA1

    a103706e4069ba0987d35efe7f17715533e91d37

    SHA256

    11b9dd078b0ff924a8da4ad3153d0be149b3d3584d76637578b22cd071d70ed5

    SHA512

    fc98bed1c13e4f1966716c54354f7c5901dce9c6c46600e749eede1481027458060ddc5a190e048c6bafcb10f77684cca420c414994e38de908956d4af52892b

  • memory/2372-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2372-74-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB