Analysis

  • max time kernel
    119s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 07:48

General

  • Target

    ef977be666beb52edc4421110c4e13c0N.exe

  • Size

    191KB

  • MD5

    ef977be666beb52edc4421110c4e13c0

  • SHA1

    adbf668a1508ed1b5f27a55b49edcaf5d0b5d919

  • SHA256

    c4b004ad8c5fc2c0f9c965945a705ef39a268f01e9cdc69761985db27bd40abd

  • SHA512

    e1f1a3bcf3a1635601adfc5d31cef7c0431835ab53fcfd9939857fb600d0124d00480a2379c9d99ea9c9299716b6e95607c2917fff4e9d00ffaf36d4a97cad4e

  • SSDEEP

    3072:6e7WpMNca3rytOkWpXfnYRl2l/9HSFHzJ0lBgnW59XR:RqKB+tOkWKR0iJ0MnW5X

Score
9/10

Malware Config

Signatures

  • Renames multiple (2810) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef977be666beb52edc4421110c4e13c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\ef977be666beb52edc4421110c4e13c0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini.tmp

    Filesize

    192KB

    MD5

    996f203f469320af8464568c8b3199c2

    SHA1

    e478a6008298a9fae4d3c0aecf1fc22db185ddda

    SHA256

    0a8ca9c0e919494d5345694447b10fe545d260a67ed00d82d733846210b4c818

    SHA512

    ee9da89cce912acf9545e70f4c4a4842f39ddca6459e76634499f722528fc5112d37492656ad7ba1132bab7a5c199014c8eeac75fe7d530450f1d772c530b092

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    201KB

    MD5

    3f56d1873b2c4a9afe39bc39724b4f92

    SHA1

    6f67d6b9c9b9fbb0dfb51a6b32fa92fc54034d5c

    SHA256

    1647bb519ed4eb63e7475ca7d393fe20280e342244a0d21799e3a0cd13739521

    SHA512

    bba8392a893d621352f2a5b4c2b4c94a8f229027680989c93e657db5b14f0555fbc8deace55b76005fcfca9cd936cd914fea387f1ca74d0668d4a67714372721