Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    21/08/2024, 00:20

General

  • Target

    8994ea158bdce297eb52459136d288c0N.exe

  • Size

    42KB

  • MD5

    8994ea158bdce297eb52459136d288c0

  • SHA1

    5d53e6d9a9ba6c7bdc06ac8c49a944b4587abbb5

  • SHA256

    dcb669b4dbc642eb89250545d1d290cf179c40b337d399961db3b68364e985a4

  • SHA512

    2895ce1eae3c11cecad44a0de75cdbba56a7e0dcf2c43989d739416a469fd5f1db70d926872b75442ff7b0cea9b87808175ac0da99528a8168470e57aab6dd5f

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfproFNFjqAJLOqAJL4ZQZM:W7ZppApBULcfpHLcfpyDX

Score
9/10

Malware Config

Signatures

  • Renames multiple (3334) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8994ea158bdce297eb52459136d288c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\8994ea158bdce297eb52459136d288c0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2244

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2257386474-3982792636-3902186748-1000\desktop.ini.tmp

          Filesize

          42KB

          MD5

          b42b1151af9e24b79b9f423c100ab893

          SHA1

          2f9ad59b47ca863a84e4df0c689ece41237fa7c4

          SHA256

          40a5a5b67d36b8eee9d6c1526e86df23c27d3a56ec247c50b216c57d6b802cc0

          SHA512

          3dae82cb5f9f906664489c0e065c7e1559445a7d570cafb1bf73da0554e7ac87426405fadc322427f38f4f1cec9ae4bc28c07926cdf8f27992326f553a5d0941

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          51KB

          MD5

          c913d149fb04b29b5f25eb5b43431d28

          SHA1

          12cfe4ff937c26f116342e43711b3ab2615a75b4

          SHA256

          a5d17474132acffaeab8925b401b57f7699dbf069be84f2f711139c73dfadbcf

          SHA512

          618e706c7127c669757fdd09c64c502a348b9ba4cc651d6138bc3b342ac0353f13d1d1599ba2aef6f474eb80f4fa018b30082f00ea3c24293e4c608369c41eeb