Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19-08-2024 03:35

General

  • Target

    5ba6947ac3ad4838f714509ca5fba380N.exe

  • Size

    72KB

  • MD5

    5ba6947ac3ad4838f714509ca5fba380

  • SHA1

    344762f98e1a270f10b581f0d6499ce314b79dd6

  • SHA256

    a5906a643bc4f35c6b909deb4123dd1dc05e5244aa14c3e72afb294522a6dae9

  • SHA512

    a472f61d7e386a6b8df03978d64a271a59002a99e9db7bf264213b65bc1e0d1238eedcff769b65d1baae4eb67653fa73e8019e1779f258afa415dfdc02af2192

  • SSDEEP

    1536:W7ZNLpApCZrt8PWGoPWGANdN+hEwHwDvZvS:6NLWpCZIzjwHwQ

Score
9/10

Malware Config

Signatures

  • Renames multiple (395) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ba6947ac3ad4838f714509ca5fba380N.exe
    "C:\Users\Admin\AppData\Local\Temp\5ba6947ac3ad4838f714509ca5fba380N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

    Filesize

    72KB

    MD5

    4e25b932ad197d2970165b6fee5e5674

    SHA1

    7f84e4f346fe86a2091994c4fc6880a1874b9ddd

    SHA256

    126d5dec2064ebfaa9196cee679c6414276cc2072a0f68903e97cf8f613461ba

    SHA512

    c0458f103c0ef54cd2d88e1ad29b3dd0c20a552e3c39a322e434bdc7c581bdb283d5f256fd5eac12508ee45f61b23ada2d3eb451d931bd36a9fb8425daa15986

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    81KB

    MD5

    c5f0ec6dbf7f4876362bdaba1e883f0d

    SHA1

    e86a0abd95413ef022672abe9f9ca90de077790f

    SHA256

    3645bbb3a8dcf0e5742644cb23928c095b0eaa7886295751bd0d648448c67806

    SHA512

    f7113f851c3cfeccda6c279b19295a169af372050f626a6f1835fbf7c2d19ff22af755f6e7eba4d714bee6d59a465a3dc0e7f9f401e5a8f602cb1052ccbf448a