Analysis

  • max time kernel
    119s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19-08-2024 04:00

General

  • Target

    11745260c89c71ab30a7bfdcc9fa3c20N.exe

  • Size

    53KB

  • MD5

    11745260c89c71ab30a7bfdcc9fa3c20

  • SHA1

    d311dd098071be8dfccf43916e97724df78e4a5a

  • SHA256

    8bcc4e6950a8363379fb4af671274d0402dd33e99ead821385c3387db2ba4714

  • SHA512

    98b1390efced3a2ad0fe414a3168864c3fcc29ae4813aabc58efb3ecfd46bf21ae420648db917b688ccbd11cafd1b939831cf28b1c6f0ceea84893bb5c6df1d7

  • SSDEEP

    768:/7BlpQpARFbhn54fmiy+3BVr54fmiy+3BV6na33EskmKsM33EskmKsN:/7ZQpApmi6nvfmK6fmK6

Score
9/10

Malware Config

Signatures

  • Renames multiple (3153) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\11745260c89c71ab30a7bfdcc9fa3c20N.exe
    "C:\Users\Admin\AppData\Local\Temp\11745260c89c71ab30a7bfdcc9fa3c20N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    53KB

    MD5

    ab32d5e88f29a59047a5d6d52a67f268

    SHA1

    f61f659d9ccdbc75c5226649385fc5b0ba61818b

    SHA256

    043e9b952b4543d6769eee797eb471737d926b572b97ed6012b72f9e35bd5237

    SHA512

    0dce140b1871db21ea353e11542f131d4baaedc4d4755e391c77acd012647f7b2097c439e61e37b76af614f3b73945936354570b5e093e95cab53fb61712c945

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    62KB

    MD5

    e6a042eedee880f57d3c92de1f73d5bd

    SHA1

    72b71f1986baef79088ae388f11904661287089d

    SHA256

    e064f1ebb0e9d44004cf3bf7da616efa1b1d6c8b6ec07d53e1b54ff19a0f884a

    SHA512

    6bfb923f4a4840a7e79956b7abfb0cc34833c08d4e990b6cb90ca5e18382b69272af49ecc77c609b8e6420652646e82c1e8fe52d72d167af4d04ba0ddbdfea0e

  • memory/2432-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2432-74-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB