Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 12:39

General

  • Target

    f452b2a4185304ce627e56f6b45ba5c0N.exe

  • Size

    68KB

  • MD5

    f452b2a4185304ce627e56f6b45ba5c0

  • SHA1

    e8b1cdfe02e1f3544762ec266764c79766d9bb37

  • SHA256

    564be74c1723a29771c1d91026b14d538119452572fce76385e5dd1b14f834e5

  • SHA512

    e016b328705b0750025c5bd8ba9e2640e6316d19afc166ffade26de39ee0e2eb37f672b530ead3a974962f7082f5e49770de3d348624e80f7b82b45d5e678b9c

  • SSDEEP

    1536:W7Z2sspApkZrZ4+fU7lK1lKT8/8aPtPfGJBtJBc:62ssWpcU7lK1lKgkEn

Score
9/10

Malware Config

Signatures

  • Renames multiple (3183) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f452b2a4185304ce627e56f6b45ba5c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\f452b2a4185304ce627e56f6b45ba5c0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    68KB

    MD5

    8a5f61fc1955466f83ba1c290ba978f6

    SHA1

    4a93cbedfac4e73ca9bef9f417ca992bdd2ead7b

    SHA256

    6e50a18fa46ab613b5a3d42dd2ff082eac8b6ab8821cc0ff1c63fad9e03cf3c0

    SHA512

    c63b3ef10f708383bdc27e0570146a422214766337f9473092f53776a9291a0a5beb12937b7a79344bd123152af90e786e2e0a462bc48384ea4193d441b6f85d

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    77KB

    MD5

    1052847c1d8f9765544f8955fab0396b

    SHA1

    1b268f56f18c24cfc5059af84d54a3c34e5727c6

    SHA256

    15e96b825fff351ba3cd00cdccc7eacacc2ff2d24bee78f240c1a81288bffd2d

    SHA512

    1f9ca86f2c636304a65681b849e85c0cef2fa11265e34936752133f8450af2435cbaada8951ff043d67ebe346adfee745610b4b189cb144d21bcc16de4ab9ab4