Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21-08-2024 10:28

General

  • Target

    653ead6189268961b445c1f11ede1750N.exe

  • Size

    40KB

  • MD5

    653ead6189268961b445c1f11ede1750

  • SHA1

    18466c0b75d9bb57465aff93081ed6ac7b193437

  • SHA256

    015ebd6d72b6dc55318545f7a5d10cf2dd781ec148506e1d767ca620e7a5cf11

  • SHA512

    0fe08c9330f0672fba3ea71350cbd94b3d2bf0a557b27f458919297bd3984b0ed73a774edc6a8e267a58501a7150b0f8d85f3df4adb60fc43226ddd36b34fbc4

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LObC8p8IzwzS:W7ZhA7pApM21LOA1LOTMu

Score
9/10

Malware Config

Signatures

  • Renames multiple (3366) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\653ead6189268961b445c1f11ede1750N.exe
    "C:\Users\Admin\AppData\Local\Temp\653ead6189268961b445c1f11ede1750N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2444

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    40KB

    MD5

    2d2eea4d2b5b1c9dc5894298086eca85

    SHA1

    d3248494e2a446947ba40416f30370df12306fd4

    SHA256

    28aace426576f8bf42a306551d75db3518ace729a1c7e747912cd4d85bb97782

    SHA512

    7bf28b4f29511670755f7003fc37dc41695deca9e671b6b5859202ba189bfbfcaa9ff61a71a84261b1fe2c1a84660adb3e75501ce764cb050c6b1906e3e1036b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    49KB

    MD5

    dd171a24dff6a34afc1b04b8822fa601

    SHA1

    278d8e042dd4a76a712148e1b7475017bf011279

    SHA256

    cb2ac106267d7dad0c4759b8c53553863aed9cd401301499f99fac24671b82e5

    SHA512

    1cd068bd2e7c04cc1b878235255da83bb3fac72686179279af15b87786f3b885ecdaea61472a2faad1546a88811d58dd33110003a1a95c12815b46944141c3be