Analysis

  • max time kernel
    120s
  • max time network
    15s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 07:21

General

  • Target

    a34040673c1521b0463e29afec700d70N.exe

  • Size

    34KB

  • MD5

    a34040673c1521b0463e29afec700d70

  • SHA1

    afb6a306728fd52aff42a9ca91b4d1de69cb30e9

  • SHA256

    c40cea191bdfddd0884dca0767044a88a72a58816295858f63f9b2f948da8d31

  • SHA512

    7cb2ba477feaa982cbd68b17e61ed2f425c0701919c998b615d1ad4a560330054b838ca56a4ddb1dc5187dd1198cb3846fe30f54b81dcf6941cdca4e86526c26

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LOl6Sl5lt+Y:W7ZhA7pApM21LOA1LOl6AB

Score
9/10

Malware Config

Signatures

  • Renames multiple (3433) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a34040673c1521b0463e29afec700d70N.exe
    "C:\Users\Admin\AppData\Local\Temp\a34040673c1521b0463e29afec700d70N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

    Filesize

    35KB

    MD5

    4a6b3c2586bae5a8428fe6fc5fae4f3c

    SHA1

    82ec30e8a0ff861da204c01b32b9d2c9ef9f0909

    SHA256

    cdf6f7885e028ea61bd667ccaad849eba67b75cbf4def61ad05d2e76f9066522

    SHA512

    ea06cde43eacb4a34a59bea170ccfc4b76d84a65a50038449a24da2d9309a0b677b0721da5ee626cd7be0d77e6fbf4031ec37421836ef07f0ba0101a0bfbc472

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    44KB

    MD5

    b49adb61f4c7557edc84d15d6796a90e

    SHA1

    cd396286ae036ece1aa046c1f65ee49c76d48963

    SHA256

    b261f2ab1742c1f71f7a646f61fbea6856507370432fc27827521af5be3b8fa1

    SHA512

    5f16c76d67f030a772977c3338bcb182618ecf573fadc7468657c31c41f77a4f365aa9f6bfed978adb2654c62301d3d737f239746bae431eb71a71fc0f55075d