Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 00:56

General

  • Target

    618d1964ce89af7c0a6365f32402cf00N.exe

  • Size

    59KB

  • MD5

    618d1964ce89af7c0a6365f32402cf00

  • SHA1

    e1d4b19391df358fa22568dfc640e65e47f8a9e4

  • SHA256

    d3a137d92cc766d44214b351d4355846121d4f5760cd4cb22f4d27a05c4e1eb8

  • SHA512

    54b73dd54f99d02609320a51c13b9872749f1f7831d36bd312001f446008c294d4efd8b96d4529e86547c45477bebe7e728d0c92dc19316876e03627bfe73d2f

  • SSDEEP

    768:/7BlpQpARFbhIYJIJDYJIJPfFpsJcFfFpsJcF+kioCHo+ioCHodYI:/7ZQpApze+eJfFpsJOfFpsJk+k9j+9jr

Score
9/10

Malware Config

Signatures

  • Renames multiple (3196) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\618d1964ce89af7c0a6365f32402cf00N.exe
    "C:\Users\Admin\AppData\Local\Temp\618d1964ce89af7c0a6365f32402cf00N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1496

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2172136094-3310281978-782691160-1000\desktop.ini.tmp

    Filesize

    60KB

    MD5

    b9b20eae4d40dfb526956495e117f4d2

    SHA1

    d6a18451a84b492624d3a51011bcf475672e33f2

    SHA256

    f77c9f66a21eb98fc63b78a77455e3f6b1d8f932e51b1c72e7088b4b9ca12542

    SHA512

    540b2512d8a864cefcb5787084d2d39a1181231f58d65766f21da30168adf377e55522956fd9f5ecd0dba80e9744ebc772e04a43aab29100dedf8d48ec6a83d8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    68KB

    MD5

    51189205056495a5dbca32412f20751e

    SHA1

    3d84bbc11e462f7c6b1c958234224ec4f12104be

    SHA256

    4bc1cf75a2f5c1b8d5051b01dc34d7b8aae86e4aed4939b2a4559991a37b1948

    SHA512

    fce27e57bde69e8532d16af8af673902ce688621f27f904b71962d2e3de1665e7dd5ea058a7b597f0640b9da8063a3d7df3fa9f8887d9bfc3cc3d3151ba90e38

  • memory/1496-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1496-74-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB