Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 12:50

General

  • Target

    c606ec631662cae5ac8ce920a84b8420N.exe

  • Size

    79KB

  • MD5

    c606ec631662cae5ac8ce920a84b8420

  • SHA1

    93b0e3631a0d66145840c12b288915d425fe735f

  • SHA256

    ec18e086e1b1db956b7016fea9fdb8195813b2ce255512ee69a414d066a2338c

  • SHA512

    891b8de97e1bee07a35f68f78064ae234ecea6ba76c81eef3d6ee39cd286db30181ec159ccfe4fc6b14d24f96b190bdb3203c8bb73578d346f142a08fc208a33

  • SSDEEP

    1536:/7ZQpApze+eJfFpsJOfFpsJeFrxFrd462:9QWpze+eJfFpsJOfFpsJ0rDrN2

Score
9/10

Malware Config

Signatures

  • Renames multiple (3106) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c606ec631662cae5ac8ce920a84b8420N.exe
    "C:\Users\Admin\AppData\Local\Temp\c606ec631662cae5ac8ce920a84b8420N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2724

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

          Filesize

          79KB

          MD5

          d100b29a58af20263cc6b272d664e625

          SHA1

          c1259d3f0568e63a5aaac481970021a0f20abdee

          SHA256

          04be5a9afce77c65565a06c6a2b0061ea37724c340b2788b043f809c1924d0bd

          SHA512

          4f5384af4081faf308e24ccaaf0524b45bddfd760d6b53e9410579f712de53b0328901f66ce1d5c9ea1fba70570ca5c89eec8fc28f2ed30a5350ea401c5b0ac6

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          88KB

          MD5

          f5d28f7993360b228f5af9be591da6fb

          SHA1

          a6d82555107593c89efc723fc45e46d6a837ec88

          SHA256

          5a2188801d0ff3dc472f7edb17baa6222265784d0c2ce67b7f9d1ee57dc0fbd7

          SHA512

          244952379ff5d407ef67a61f7360bf7f1e41eef122cab3d708f2135a24892f6dca0d3ec10c7c786bf65b6d912be0d97b30f4f0d7984a1f53c0490b503889f68d

        • memory/2724-0-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/2724-70-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB