Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    21-08-2024 09:37

General

  • Target

    fee395b98b50b17f742fd5baed9241d0N.exe

  • Size

    36KB

  • MD5

    fee395b98b50b17f742fd5baed9241d0

  • SHA1

    edf19dde5fa93ad590983f00c512465d959d07dd

  • SHA256

    721c0b1c6061f62466496d9a20fdbce11dbe709ff60792aa8a0fc0a726fc9fee

  • SHA512

    938e755f80346c6aa41c4d78813b996169f4dc396bd753ba88d9cad72b4ed1f990f11f3293add1122ca628ca35200ab1f4e544838a11c629def6db1bd47e8a9a

  • SSDEEP

    192:pACU3DIY0Br5xjL/EAgAQmP1oynLb22vB7m/FJHo7m/FJHhpqNaYcJaYcmRsOcD:yBs7Br5xjL8AgA71FbhvsDYcUYcGcD

Score
9/10

Malware Config

Signatures

  • Renames multiple (3301) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fee395b98b50b17f742fd5baed9241d0N.exe
    "C:\Users\Admin\AppData\Local\Temp\fee395b98b50b17f742fd5baed9241d0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2172136094-3310281978-782691160-1000\desktop.ini.tmp

    Filesize

    37KB

    MD5

    e58cfa52dc9b6644f054ffd874ff65f0

    SHA1

    7f26bf08d0ec962316fdac33900a540e6e2c1501

    SHA256

    0c9394030a85e9807f21bff8c470d0ed57ff2c378cd892de8698f70307f70eb1

    SHA512

    e5207fa631e5dc63f8cab9a1a0e31d5431bc6b0312c5d4c407df45e30077ce0fb36821771e781f188f355a619af35cec964bc63a6da863a5f5e39fa0a77460eb

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    45KB

    MD5

    d32d55ebbf2fd9ea91999058dc03e806

    SHA1

    9d2111bdec634171272c66ea3915bda22798d904

    SHA256

    7862193b12c1b76c0d3e5875839aaea62a185596c15a3437677d34ac9c7a9171

    SHA512

    a2253c3e91277d6df052a93518c9d8ff62c204aeb583dcbf3bcd635b3f52f81342f4106223af71b33d531f4c41ff5a9b27a54478cba7061736aae120c32d97e0

  • memory/1732-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1732-74-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB