Analysis

  • max time kernel
    120s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19-08-2024 02:09

General

  • Target

    47f3455950ab297104ddbd7ef0f83ec0N.exe

  • Size

    42KB

  • MD5

    47f3455950ab297104ddbd7ef0f83ec0

  • SHA1

    8266aef0cf077999de88a683db31dbd5ba60d0f2

  • SHA256

    21872f2c746eb610e6d80cc917ced579a8cb71ff3a30c677d019f109334776c2

  • SHA512

    d0153fb301ee65c5e31e65fb3584de4c2e68cce59108fd5d742d49a2cde137155bb2154690959d2e25cf6231d3561607213393a3fca05faa1ed952c4687989b4

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfproFNFjqAJLOqAJLL:W7ZppApBULcfpHLcfpyDI

Score
9/10

Malware Config

Signatures

  • Renames multiple (332) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\47f3455950ab297104ddbd7ef0f83ec0N.exe
    "C:\Users\Admin\AppData\Local\Temp\47f3455950ab297104ddbd7ef0f83ec0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

    Filesize

    42KB

    MD5

    8b8e67f4fc21860175a3ed1ca43abd86

    SHA1

    ed8c929ad36774c90e88843055e958b9fa16b434

    SHA256

    102ad32a4b6c0ad9888601425e5aa063aa62f30094b9107236f34e40ba858ae0

    SHA512

    e0b43cff4aac866e542673c16ff4bad17ddbb22256575766ec7c91fd2e108cf9c74a9cce841ff70e757b31c56aca625dc00436e217cfb4fdca834bdf6fbab5fb

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    51KB

    MD5

    f1a15a4d26c3ab28dbcb2c22ba5ce29c

    SHA1

    39619f56ccf64ffd1f8a45d42f9252886772ac95

    SHA256

    1ddf2df8e4d758a134c2c6b55d08bfa2b0f9b980b345352fbbbb4c535629e826

    SHA512

    ade9e13821ceaff42ad242656acbd8c2ba773c47c783feee6251732e3bc000e51caabca1ebac0583c066cd7e90ce8af583014ab14ce2a69bcf05348813c1db40