Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 18:40

General

  • Target

    82a620f5b49347b05c42f36f3a62d580N.exe

  • Size

    94KB

  • MD5

    82a620f5b49347b05c42f36f3a62d580

  • SHA1

    3199a2be46a01568d82a63e95e5c2afdea79ff1c

  • SHA256

    26870c6084ac096243f219778d506884a53a2952e48ad119222e45b9dafeaf21

  • SHA512

    93c0c2b4be6c0a689060c716eda5da8f9ea04820708923dddf554d7a9a024b8fd2315fd76fa631c4c4351cfcabb96f0a761976e99e31b11cefc31f27168a9ecc

  • SSDEEP

    1536:W7ZhA7pApH9QHwtRF9ESWu0SWujodsodaNovTW+SPL+cycWAF689ilYp/Dop/DG:6e7WpHIyRF9ESWu0SWujKsKRsP9fVL9f

Score
9/10

Malware Config

Signatures

  • Renames multiple (2876) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\82a620f5b49347b05c42f36f3a62d580N.exe
    "C:\Users\Admin\AppData\Local\Temp\82a620f5b49347b05c42f36f3a62d580N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2292

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

          Filesize

          95KB

          MD5

          698093958e35a73597d3823f8ac64326

          SHA1

          0492f2be839cdb7bc095f62753b0d0eb6ea53762

          SHA256

          3d99e9cc04c27e7eb2c8cbf0fa302d4b548d0fa9401e348256261599a0d3cfdf

          SHA512

          19e3f2b6d28d447c4bbc08fa2d5807ab195edd9c3aed0ae7ccac905f55642567c44bddbc0692dc30722a112445334ec584da015b6390c1d1ff4c300040d53ac8

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          104KB

          MD5

          5c3673a46887902ed5ef75f6e5769b08

          SHA1

          e11454cd47237064951a367e8ef17d2bf1840bfc

          SHA256

          f7a8b14bfcd7117f638c32f3f915ebe4d27e1713a9102169678977ee960971bf

          SHA512

          0cbe7ccadeb2725a663597237ecb4113fcbe9de5f6d9f391b2422edb46185e4af337ec0806fb68429b0c1a50b28a98393ff54e020aee953b73004371fcdc920e