Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    18-08-2024 20:58

General

  • Target

    05c5fea059ec35c341b90b6bb62e0490N.exe

  • Size

    70KB

  • MD5

    05c5fea059ec35c341b90b6bb62e0490

  • SHA1

    8314efd7c5e1f9ff1c469edfece90be1509e5fee

  • SHA256

    da9112c803ff1441788c963d9e5cf3d72dd84ae1412757961edd680fee1eb1c5

  • SHA512

    07311c4c68f78b6d3abc59bceb6e866dc33529b6f466ea7a78fb0469c5b03bbc4105dc32293828ee54e62a4c940a2f84e63e2afe9022ab4b29c00c5615e2afd6

  • SSDEEP

    1536:W7ZppApBULcfpHLcfpX2/Nw/NwmxR2RWTW0:6pWpBwchcV2Wx1

Score
9/10

Malware Config

Signatures

  • Renames multiple (3662) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\05c5fea059ec35c341b90b6bb62e0490N.exe
    "C:\Users\Admin\AppData\Local\Temp\05c5fea059ec35c341b90b6bb62e0490N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

    Filesize

    70KB

    MD5

    155c4f63a825b5f064d6796a8c349c93

    SHA1

    f76c24620013d0f43139c52bfdc2f0429d62ff52

    SHA256

    a724754510bdd81d2379447033763b112f356a113908b04e1e766de17983e762

    SHA512

    7606fa0f9ee32dcf004eb07555ef8d2c309c04fbee10a6f787c158267f495743390a4c17e2653887178ceb9e5ebfe3bdc6adfac7033283c81e1193c1a21de626

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    79KB

    MD5

    0cb6df1a3eeaae21e589d87ea06a5924

    SHA1

    abd4bdc83ab6b96f969ae6a0063cd1ff9bb7633b

    SHA256

    753c1afff5fa77798c79896f3efb4e42a6a72a109c123d790777a603afec7beb

    SHA512

    f91cfcc90fdc5c82a802e32bece98cbee6358819052df44c821789cfe336cc635c45534abab039eb20066e4b31f22fa03a46aa5f817f1b6159c8992fb6a8502f