Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20-08-2024 15:25

General

  • Target

    f682ecd0603827383141f724391bb5b0N.exe

  • Size

    44KB

  • MD5

    f682ecd0603827383141f724391bb5b0

  • SHA1

    da01d75ee00477478a4cd29781ec988e9a5b7070

  • SHA256

    d300aa8551db09a50e4da3422a0b84c2f89a167b9e23983d93104defd74466ea

  • SHA512

    13c00653dd96e07a67fbb98ab020fd6ccbde100c2fdc8cf934b5568196b09e4ff42104c2763fda16d9fea068c848a831f7af926aa50341f9b903b9612f0760d4

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfproFNFjqAJLOqAJLFdyGdynmpmrKnK8:W7ZppApBULcfpHLcfpyDUdyGdynmpmW5

Score
9/10

Malware Config

Signatures

  • Renames multiple (3312) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f682ecd0603827383141f724391bb5b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\f682ecd0603827383141f724391bb5b0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2272

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

    Filesize

    44KB

    MD5

    ed8b5c5e078402d4e1ff5a4c515db01d

    SHA1

    589938f9de44a68c571fc79c2c7fd3c4a59c98cd

    SHA256

    6b122589957d4c0f3526932178117fdd54bd450ef3dbdc762ffcda36498dddb6

    SHA512

    0f5981678816f8a50192c71b0aec77076c9385d1e915d1922ca11c757cd7ecb060bf835bc9f2a792237e291e27a532ef9249d66fa3cfe6c6e9a219f3f30aedad

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    53KB

    MD5

    316e35a1c49ed71d92706ca9950b4f06

    SHA1

    71a8f9ea72a2d8a8edd84ad52f138eb6944604c8

    SHA256

    ec367e870b9e21eace75b72f5406287c4d65accba0a1d35519bd6d9baca0db75

    SHA512

    9c9dd02de440a920acce9ce3be8ad58a5a8ce3c72b88a576f919ab68c242cfcb5f78d5c1060e9afb867242fe1ca684258f6113b5c7ec534238b3d35e1b85c7ff