Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    19-08-2024 10:36

General

  • Target

    8fa6d40f1e269d37d662fb6fdc7fed40N.exe

  • Size

    80KB

  • MD5

    8fa6d40f1e269d37d662fb6fdc7fed40

  • SHA1

    499cfb2410504e3948387ca725053aeef5086cf9

  • SHA256

    b4cf4bc36187f86c32b4fc6b3314af1172fe878120b6ecbed55963e9bea4f9d6

  • SHA512

    51357c4acb818b78672225592c1d076bad8f29d26d9fc5537a7ce5560ce283486d1fcd8b48759991a4e01fe5ece6063ff4555b504d73ff373e5768b8ab942188

  • SSDEEP

    1536:W7ZhA7pApvOsOKM4HBhaGwOQ54xEIjlmeU:6e7WpRaSljq

Score
9/10

Malware Config

Signatures

  • Renames multiple (3147) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8fa6d40f1e269d37d662fb6fdc7fed40N.exe
    "C:\Users\Admin\AppData\Local\Temp\8fa6d40f1e269d37d662fb6fdc7fed40N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2172136094-3310281978-782691160-1000\desktop.ini.tmp

    Filesize

    80KB

    MD5

    1cedb711a40802247d493d4453e3aed5

    SHA1

    7c3496a3821ee98536467100b43c5e8b656fefa2

    SHA256

    05feb5c335a697860e44498b325ba7cac803faa7098e1958175eede31655489b

    SHA512

    cc859b4f108b61a8f711e01d1c0f7a9966e461eed67013b424c9210e041f6ed19440586f77384c07425b5f9bac789a2dd6835dfde6a560609fea5456cc3bcd53

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    89KB

    MD5

    b1e1e639f3f39808b02f2a7b98f75e93

    SHA1

    d4c290764c87ab3ec72382ebd39109924e16bec6

    SHA256

    a4f7c4e2ca45bf36064242c648c5d49c9222fb3fad41f5232916648095041c5b

    SHA512

    fecd5f8b604edff9345f3a2352cd82aa79800805c5e66edc56dbc1df939487467fdcbc18f95ef522a3439b0ac7ddca996fa48956db19809f2a21d8889192eb59