Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 20:43

General

  • Target

    d5365866ae3f896c1c832077780c6520N.exe

  • Size

    76KB

  • MD5

    d5365866ae3f896c1c832077780c6520

  • SHA1

    dd96bbd397716940e3c9e37f03c003922b0316e6

  • SHA256

    5f041ff71a2389c895ca807777434235b26eca85cb7fded8c52041858f001c27

  • SHA512

    5dfbfeb787ea5edd9baa10a35f8fb5a9bed5bb054d9f1ee923c0f607f381ae684877a4f11f1bfa4cc2b9b97aee4657a45e3f291292c05047f65e1b899a83a02b

  • SSDEEP

    1536:p7ZhA7dAp1++PJHJXA/OsIZfzc3/Q8Ue+bCeI:Te76WQSotbCeI

Score
9/10

Malware Config

Signatures

  • Renames multiple (3062) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5365866ae3f896c1c832077780c6520N.exe
    "C:\Users\Admin\AppData\Local\Temp\d5365866ae3f896c1c832077780c6520N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2168

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

          Filesize

          77KB

          MD5

          ccd5ddbc727ee2619ba8805e7d5d9c33

          SHA1

          a836658da5af38843b5134549322b58ddcc3148f

          SHA256

          ad4376fa87fc44af28ed08447616d6031a9f0650e1157609c64395854085a6d2

          SHA512

          8acabb2cde4acbc9da7beb12ed6978be1b6ef85ff8b263c6783864484f1f8573d9aff20ddd0971a5095f6bdb93718bf3addc3847f01fbbf9746642613fbcbeb2

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          86KB

          MD5

          4534551ab079b23683ae3af308faa1b5

          SHA1

          bc2d5b38c283280ce938209937133be4e4b76814

          SHA256

          3d61398ce63de9750146579cc400f3030090ba01999ccf638e71ee6e647fdda4

          SHA512

          358daea4a227c661097ce0d461f40ad29368dc25907e4841ab62023c16e54b640814c19cababa63827879e4645f95af0ed6de28a7d6225ccbd0f54ebf5e62300