Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 03:49

General

  • Target

    47672a3027fcb41ef3b1049149ac4f40N.exe

  • Size

    101KB

  • MD5

    47672a3027fcb41ef3b1049149ac4f40

  • SHA1

    fe2400d176849da223bfb17ab070e1eb37d7936b

  • SHA256

    333d024a7481e9d9d680024f11438793af72ce15f3610b4a2a0fa06c69764230

  • SHA512

    b383d5d4fbed343f7c9e6d723c018baaca77b10b35b05d060cb2bdc6a767a418023d1be6949413c92f79af873223e3589336fb82855b9f7df55630c03193a4f3

  • SSDEEP

    3072:6e7WpMaxeb0CYJ97lEYNR73e+eKZHfFpsJOfFpsJ6XO:RqKvb0CYJ973e+eKZ8

Score
9/10

Malware Config

Signatures

  • Renames multiple (2920) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\47672a3027fcb41ef3b1049149ac4f40N.exe
    "C:\Users\Admin\AppData\Local\Temp\47672a3027fcb41ef3b1049149ac4f40N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    102KB

    MD5

    18edc51d2e9a863869ddb98bb0610710

    SHA1

    6f253029715ffc30d1ee26472ddbf0ccad5e1225

    SHA256

    cabc6bee6c6f498877ad6f35b2a3efa471967dfacb2ce3d323fafcfe0c853ce9

    SHA512

    f971cc4e53fe414002a3ac8d0a70dc614f356e14767fe747c2d76a6b5ccdacf5ecbbe268dd7d8d184098078ed83a8c70253dfe13d1939883f3acecddad532554

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    111KB

    MD5

    02f335e2bf7e0c703a9c0eb38ccf8104

    SHA1

    dfcf8513bf6356a143edd54e9e40888fb9019a0e

    SHA256

    3b3149a4e56eea4b5454cac327f995c1c4fb574f36c72c66d04326c0e909b807

    SHA512

    cc518c23d723c05b860b0aa02701f630e82b3ca6dc35bdf785b5f3979e08f150fe1675d28ca443024921db625f5ce29ccade9124d647658df61e7e0b42efe7df