Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19-08-2024 22:28

General

  • Target

    7b47583e194ad2419ac76a8f63bdf000N.exe

  • Size

    60KB

  • MD5

    7b47583e194ad2419ac76a8f63bdf000

  • SHA1

    f640f6f457cc3d0d3be6255befcc1f25afe53f57

  • SHA256

    c258c754a3982aaeb29a5aa779616cca56728f368b09b2ace6725e575072654b

  • SHA512

    633b880fac75097668a36a3a4cc9de8e61812157af0e621c09611770e78037e985b5f8a2ae906bb7ce2058eebb84945c14141c2e831d472690877e58c33b6f9d

  • SSDEEP

    768:/7BlpQpARFbhfUnUNRawAlW1VkRawAlW1V4T7mJr:/7ZQpApfWELkL4T7O

Score
9/10

Malware Config

Signatures

  • Renames multiple (3194) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b47583e194ad2419ac76a8f63bdf000N.exe
    "C:\Users\Admin\AppData\Local\Temp\7b47583e194ad2419ac76a8f63bdf000N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

    Filesize

    60KB

    MD5

    1fcaa48fa217c5d62acf431d6461ad12

    SHA1

    92f3541257e24ba28afa33216ac6a2e9cb99333c

    SHA256

    a6ecf6111445bfb2fdeac44df6e76a220d6596865d4f753b37a8a99e62b771e6

    SHA512

    078c7ed5aa79cdcd6531fe49c711e073f3f0b0003582555d96a4dfba8b55c7bfbb433cf9bb4ed6854383e79fd79d3d8aae42d3e0ff22c421338cd8232194dc31

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    69KB

    MD5

    8febfe6c7759088afa4abd971508945c

    SHA1

    b2417101fbd4ac8f2aa6d0046ffe5394deb2bd03

    SHA256

    60de610b9840fb47e4e788dd08664943a3245d201d38674cdabb295579e5d021

    SHA512

    a557f2ab18f1b3f8eca2f8806b37648c254174bd2a7fc34b8ce55db3719cf017b0730ce562ead87019d1d2f58110d9a153a41dab0067d0d4575d52211daf59bb

  • memory/1316-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1316-74-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB