Analysis

  • max time kernel
    120s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    23-08-2024 14:43

General

  • Target

    c84f7dc57381e6b5a406c58379009230N.exe

  • Size

    45KB

  • MD5

    c84f7dc57381e6b5a406c58379009230

  • SHA1

    35a1c6d5ca7e67d16c8d7987406610fbf8c0b0a9

  • SHA256

    6d967da7c86c5853aaa6976d0e70bf2682339d0468d3abfe8116a257317f2376

  • SHA512

    669f770ae3874cf14df7d0e64c170b7681c241c789e83aad79bbd29ff3c8671647d84e4d8d49768a55b221d5d88ba7731519b5d97be7b171107fdc3902b6ba40

  • SSDEEP

    384:yBs7Br5xjL8AgA71Fbhv/FzzwzYYo8F8S:/7BlpQpARFbhNIYYo8F8S

Score
9/10

Malware Config

Signatures

  • Renames multiple (3218) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c84f7dc57381e6b5a406c58379009230N.exe
    "C:\Users\Admin\AppData\Local\Temp\c84f7dc57381e6b5a406c58379009230N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    45KB

    MD5

    2eb9a37a7963c6d34ed2a4b43f388cae

    SHA1

    d7c051eb4d166478765edf24f272296928998c45

    SHA256

    bdb88dca507549f94ec507f62379ce27c03dc3c6d68371d0179069e7b49cc89f

    SHA512

    b1ec20dd5cebdbc4af1abcfed259565261af0206add6a4d462a2223432daec0b49da7298794e24daac140d83bcec9ce96621899e2b59d18fa6c55a7055854fa4

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    54KB

    MD5

    f11dcb651d5b3ed7d7e1effa14a1e00a

    SHA1

    5a234ca427e41943658066b2d0ec7d7106f28378

    SHA256

    44ce52e16260258a1211ba995741438d88a6ab51fb3ed951f27c750aac3e0d6e

    SHA512

    773b70781a2b159f463fe5847b9877f0535f7f93b282c2d8ea68fe1fd122f8fae12ece72e09c0aa2541ba27bd5940a2d4c9e34c1cf4b3ace87b2ac81b9da1e5c

  • memory/2928-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2928-70-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB