Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 14:08

General

  • Target

    184be91a62abb2e936acf3426be7bc00N.exe

  • Size

    37KB

  • MD5

    184be91a62abb2e936acf3426be7bc00

  • SHA1

    817093fff813b73318b952c0d46e3f4eac28f8a8

  • SHA256

    009b8fe24e486599852e65b2232d38a66d4d83aa0daffbd60d18901cdbe5e049

  • SHA512

    43b30849a4d35aaba139c12e7e80544b0fc9c8ac827733b1a01cd74b1b6e09a8476babc4ded5cb084f5461d14801ee527035f99402b8832a7ae0c439719e0e66

  • SSDEEP

    192:pACU3DIY0Br5xjL/EAgAQmP1oynLb22vB7m/FJHo7m/FJHA9jxjM1GM2kS0Ie1GF:yBs7Br5xjL8AgA71Fbhv/F70U0y

Score
9/10

Malware Config

Signatures

  • Renames multiple (3206) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\184be91a62abb2e936acf3426be7bc00N.exe
    "C:\Users\Admin\AppData\Local\Temp\184be91a62abb2e936acf3426be7bc00N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2356

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

          Filesize

          37KB

          MD5

          0f6012f5292e9987913e863f96b445d1

          SHA1

          fc5c5af4e7e1020b2efa2864f2d231ba2370f4a8

          SHA256

          5967c32d5814a3807792f3d88334dcd0f401694ca7ba0df25dfd0a5883d7327e

          SHA512

          c4e6d65a89f55397850eb97716e6c8e30dbe8a2442393d2d405a227b61c7766819a21eaca9ad9deb7902182a8afbc24cf8c5aa0ab9c13ed5c2ae8edb83b2ad32

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          46KB

          MD5

          2845823dff5c51ffe595ab1761837eb7

          SHA1

          12d0959b1c25b11d3a2e229dcfa172208f8b93a5

          SHA256

          884ec49e383c039473413fa2d3591c76a02e0c3ddf1387b2461026d3ec912afb

          SHA512

          b890d4a41175fec75a3344b0a16e6d3e4f099f069141cfe3c65694589e0c716235d59916043fde99b735a15824cf7370db9a4cf709d007f9d4ece185273e18f2

        • memory/2356-0-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/2356-70-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB