Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 00:54

General

  • Target

    92756167b95b894dbe6a689d4a1f5c50N.exe

  • Size

    47KB

  • MD5

    92756167b95b894dbe6a689d4a1f5c50

  • SHA1

    c8f3e3d262e1e18dd642e29a65dfa317799e5956

  • SHA256

    e30373da8e4bfff25a14316692d0c67c0e37e974eb8e05dcc73a5aa020354d96

  • SHA512

    e1da9367af35829b1d587e58d3df3709b37653938d307c47a5fdd5be41b1ca3852d0ca929274146160e1256262e43678ae798b14d3e962b1edee23c2fd3d7c15

  • SSDEEP

    768:W7BlphA7pARFbhL801VvM801Vvv7cYl7+obSfxDsT7+obSfxDso:W7ZhA7pApw03vR03v4YV+obSfxDsH+oS

Score
9/10

Malware Config

Signatures

  • Renames multiple (3276) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\92756167b95b894dbe6a689d4a1f5c50N.exe
    "C:\Users\Admin\AppData\Local\Temp\92756167b95b894dbe6a689d4a1f5c50N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1040

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

          Filesize

          48KB

          MD5

          bd949f92c75b0909be373be9c98610f7

          SHA1

          2170d859ea1eb4b6a9e2082462e3dcfef08b60cd

          SHA256

          2b38ed9b1763955c5dcac82c64f49355bc4b0bd687ccf5d1429c78a0d51b3f38

          SHA512

          ffbbb483f937e94fe9d30e563bb4e4b705a62446e81ca141d216e242255f59acd7e727cbaab84d18706e31b9ca460ef74d5d0e19322125bf41cdfe946c068f3f

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          56KB

          MD5

          d6bdaf57a3c086da2538ad8493928197

          SHA1

          ac8f0aa3e1b7a01b60d2c55719a16cbc146349fb

          SHA256

          e76997845ee483f4a0c5cbf6754aa08234c5e54b79e1e7f8b76b57aeee692b03

          SHA512

          ffa118e43a69c053ca789edbde8df013f7c7a025f6e2698988422191bf3db690ee2d9647638582b363fb116eae43385eb46704665537a067325d425840971320