Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19-08-2024 15:36

General

  • Target

    f879f38cbaf98d2c3ad094e80c361610N.exe

  • Size

    110KB

  • MD5

    f879f38cbaf98d2c3ad094e80c361610

  • SHA1

    b54a737f82d3c5dd939d6411a20a9f02f5df7472

  • SHA256

    77c2223775eeab6abacd73fe96334333251107e184c1412bb5bc1ba202115b7d

  • SHA512

    23723213a87d9686e4d5c07914408d944ce8923531ac012817b03b5ff4fccf292f959282f91f2bf8069580bec5fa9515230b3a716ed9814436452f5125b59f35

  • SSDEEP

    3072:6pWpUFpEhLfyBtPf50FWkFpPDze/qFsxEhLfyBtPf50FWkFpPDze/qFslEhLfyBS:PqFF2Ie+efsim2J

Score
9/10

Malware Config

Signatures

  • Renames multiple (2859) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f879f38cbaf98d2c3ad094e80c361610N.exe
    "C:\Users\Admin\AppData\Local\Temp\f879f38cbaf98d2c3ad094e80c361610N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    111KB

    MD5

    2c459e43a10aa9a2001efb7486789e30

    SHA1

    a6bf9ce47e0fc18830a5a8a6bfef3a9d56fb5005

    SHA256

    67363012551a164741fce6f61db8ea5347177cc6cac643ebe59c2ee946942606

    SHA512

    0e9b95769ba8dc348bbb2a9772d32fdbb3281a9914fdd934a9ac0b9d955904cc457a3e90bb8ac1d89f66597286c2881e5f84662649d76855fcedce742f6026fd

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    120KB

    MD5

    1c16f8bc96a7689583d5905715445f5b

    SHA1

    fb6f566da3cf9c1d965b8f5422cfb433f570730d

    SHA256

    50dbd3e7ab10d2052baf657c57b9efdfb92c349fb01701f5caebd4bf8f2fb778

    SHA512

    65a00ea3418e3cf379ea24bf95ffd5348b022963dea4c17ba801de0b81ab04a078b82d4116f003382af4f6ece39f4b16b2730480b68f2658aa6ae209524a136e