Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 17:14

General

  • Target

    c70170e48569d4f33516731b049fec40N.exe

  • Size

    44KB

  • MD5

    c70170e48569d4f33516731b049fec40

  • SHA1

    d1150acb0a2ebf7b5eaac52bb22e3f106f5bda6c

  • SHA256

    baca7b9c0950da164aaaad9057de815259945f756e070effcfbebd9805458c64

  • SHA512

    d517f9225d2ccd3c8e3346b357f658f80934d72b94664761274cebdc69b2cb1ab440d916ef3c3e2d180f68e71603ff7fcd64195553a92f85c59021c8cdb9adaf

  • SSDEEP

    384:yBs7Br5xjL8AgA71FbhvBfepj3cfepj3KtLJilqGelqGjFS:/7BlpQpARFbhq1KtGFGjFS

Score
9/10

Malware Config

Signatures

  • Renames multiple (3374) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c70170e48569d4f33516731b049fec40N.exe
    "C:\Users\Admin\AppData\Local\Temp\c70170e48569d4f33516731b049fec40N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    45KB

    MD5

    14616fdfcbb650bd82d68d35922913b2

    SHA1

    da2990f6b002f90fb44efae354be6af53bd6dc06

    SHA256

    053156aaa7debf8b89c3a50295c28223cd3352ae8ce699ddf94dd378d0da7827

    SHA512

    1c87ac79e0e7ee5dfd20cd7b341f1cd5a767a45fd7bdb95ba9f2c5cd5abf5e2636645d15f9c306ad45c03b2b215f8e95348787b1798a1eb376dd40097ee268a3

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    54KB

    MD5

    07b2c2990d2ff81c31ac2302b9bd8a82

    SHA1

    46c20d84879d821a21d8ae5dcc29f61423977f40

    SHA256

    59fb8b72634c8a31f6d1fc4742b6bec18c4c9ac5ebe8744e313cf95f3d27828d

    SHA512

    c66d53b0dfd7160d9b87bb5792b83fc8ec203ba481fb869b0ad457793c6337903e8178f170db6568680457d079008f9c25e5e8075874fb841fbbdd1696dd4df9

  • memory/2348-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2348-74-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB