Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 16:36

General

  • Target

    fc1e532a0f2935079af06557289c60a0N.exe

  • Size

    80KB

  • MD5

    fc1e532a0f2935079af06557289c60a0

  • SHA1

    b7904fb78f73389f9dbd5625e837547dc5a0df9f

  • SHA256

    001368ef747c9b09c920a339537a45381bb492ef8a34e7e37e8bb22e3ecfd377

  • SHA512

    076b4db5a4480ff7bb0cc2938c367f05f353b164b3d7875fb4ebb73569ff9015d482728ff28cf87e27d86129d3e813ca81368c718b19cf0e1583c2c570fbd7d5

  • SSDEEP

    1536:W7Z+pApfGQ3y3RWvfmRfm9sKsSd55tDYTYRa9S2:6+WpDfmRfmhJts8o

Score
9/10

Malware Config

Signatures

  • Renames multiple (3070) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc1e532a0f2935079af06557289c60a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\fc1e532a0f2935079af06557289c60a0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1820

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

          Filesize

          81KB

          MD5

          5e8fd9da70a6e4a6795ca0409cf37357

          SHA1

          edbc110a485084d6629752ba4d600a315ef95da4

          SHA256

          1b23bcf2f572e1674b513e460fdb53b146d55ee6dfd17aa3d2c62804ff8e7866

          SHA512

          175365cc86698eb4354e9fbb677ae09781daff58553ab8d1feb156932511dbab52dd4b62fe0060c9b1b64e0b52944326d08c3725c081e371bbb53e2e6ee4e661

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          89KB

          MD5

          fcf10cba6e59dda93af94fdbe6f6fbf2

          SHA1

          e9c5b7574971e2fb018a1a53b1a0eab1dbb15c7c

          SHA256

          6a63ca642a93e9059a6d47b357f1d44fb4aeaf52a63c1ca54a67b3b23c09e4aa

          SHA512

          a15059ba9cd262dcb7bed28c093684386285bced9b0ae475cb2b089470edd6c31fcaa53ae581aeb8d961816ab23f5c040628dd9aea426acb1060b8a09182836f