Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20-08-2024 15:39

General

  • Target

    296f6bcbc88e6981ce82e2882829b6c0N.exe

  • Size

    77KB

  • MD5

    296f6bcbc88e6981ce82e2882829b6c0

  • SHA1

    b681240c89adb54ffa1d6a67faadb658b1c2dd66

  • SHA256

    e0030726136d19a742ca0f126c8b82c0bb571875f81f09ac2fa574368abdecf4

  • SHA512

    823b002526e527a1aa35e027aa9905f34914d453da1e20a39a23d64de4736b988755035d54d4f92f25b50b6fe8e99df72ff4de1969aff4e169909fa32ffbd5bb

  • SSDEEP

    1536:W7ZhA7pApvOsOKM4HBhaGwOQ54xEIjlEG:6e7WpRaSljeG

Score
9/10

Malware Config

Signatures

  • Renames multiple (3091) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\296f6bcbc88e6981ce82e2882829b6c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\296f6bcbc88e6981ce82e2882829b6c0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    77KB

    MD5

    d556f88a734717b82ab34843804dae77

    SHA1

    b6397a346c5063761c21fb87c9eceded06b8dbfd

    SHA256

    0290e94f369027b46fd09925148775d02d0e8d63917dc53053b4cf17f776705d

    SHA512

    ec1b3da9aee888c81d34bc30a212a3f37402512f5cba4cba5fdf9ef0d6a08df60f46b9711b6f3a2f7d6cfb197d5031b4036fb419250ca4e29f1f5ca2f7f5a77c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    86KB

    MD5

    993d738780d4c42e6006733a32c1325e

    SHA1

    7121a808dca600bbff62231f16a55a4f51b85aa3

    SHA256

    2e589ba3aeb0f815ba138389b1394ec3659842f49725cf4990488f60b97ea5ca

    SHA512

    cb0b0a5290492be880d9fdfbd5206cf4bb802d6c16e99da523239a60ae0b919ffbf98e4ceb06273488fa2944305c928140e8a20d687671b0a60c785327288e1f