Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    19-08-2024 02:04

General

  • Target

    1c8085e8aad444fbc20b535ed4e63730N.exe

  • Size

    38KB

  • MD5

    1c8085e8aad444fbc20b535ed4e63730

  • SHA1

    2827c99d63322322fbad90f0123d5efba5fbacc8

  • SHA256

    b514d69b28f098875e1f8525cd9a5a8dd05760f81637843a579349e4524c4c54

  • SHA512

    89d3723cba0c40cad42d7f9b44710f03732ee96230f20bf64ce8fe1c5834a873d231e2cca30041dc613ae9193f1318313045ebdd386b42b33814d99906742799

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfpAfxRfxX:W7ZppApBULcfpHLcfpAfxRfxX

Score
9/10

Malware Config

Signatures

  • Renames multiple (3241) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c8085e8aad444fbc20b535ed4e63730N.exe
    "C:\Users\Admin\AppData\Local\Temp\1c8085e8aad444fbc20b535ed4e63730N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2564

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    39KB

    MD5

    8e316cf600fb564718e4c7c77a376291

    SHA1

    b10a274ba2d9abdbe8dd0133668cad5fe5c56b1a

    SHA256

    baa56afe955afedae242fc126f8090c1b77531d8a4b02025951be2fa3a9e6114

    SHA512

    df52499c9736199bdfd42a02c1ba346cb62f0e12f177b0ba40614ca389e70b5269dadf7ce9ebfc02eee5095b554a437a78f214826570d81ca146941687544a87

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    48KB

    MD5

    0f048b2bbf8483b8fafe84bd6195160d

    SHA1

    b0ed43ee423162f2fc3bce01957f502cf014a04e

    SHA256

    481bf0b94f33ba60f59bee80d532a399ca2b33436c5d787607d2f9b59585fd51

    SHA512

    86bec9010662022e98b0500a2d46e361b3f1875fba006c9fbf689b7a8ab376d226c19eb1de7013d3aa368a9c9df320ae335c3c5e09eb111f6fec3bfa02d50789