Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 20:21

General

  • Target

    20aafaffc88d9547c57ca5ed4b73ff20N.exe

  • Size

    74KB

  • MD5

    20aafaffc88d9547c57ca5ed4b73ff20

  • SHA1

    77032358267edacfba32ef72a4cd1b45fcc60b90

  • SHA256

    b3782a404539790b14db0fdfc9611e4866a3e444359953986d66bcdd7dc706c9

  • SHA512

    5a7c0c51d0dacb5b470ec3f94e20cc4b10f266a17688151da1e6a1e181b00b4fcc8412654c3ad59e64b2977ab92e8cd1ff7452dfad127c36972cc196e4eadcc0

  • SSDEEP

    1536:W7ZNLpApCZrt8PWGoPWGANdN+hEwHwDvZvKfj6T:6NLWpCZIzjwHwYf6

Score
9/10

Malware Config

Signatures

  • Renames multiple (3076) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\20aafaffc88d9547c57ca5ed4b73ff20N.exe
    "C:\Users\Admin\AppData\Local\Temp\20aafaffc88d9547c57ca5ed4b73ff20N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1820

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

          Filesize

          75KB

          MD5

          7b3eb8277a9e06987ba9d9a41d8613c8

          SHA1

          cd0d2d451f70a083ae0815c25596449469486ae0

          SHA256

          2621ca4a2aa1bf32be4bcf3e4fbf920386ee1b9aece20aaf5add7df767a203a5

          SHA512

          7713e9053b5e805837965f5f6ee2931e43a1c07963ebe317564ff61c862accb509f5b2a76fbb447471fb82e39c1eea0974e37eb2fa8e11cf3c2929ba4cab44bf

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          84KB

          MD5

          37d3dd7c931ddced04fc7942210d9e01

          SHA1

          80df88eb4c6ee04aef6cac3007e54e0a639e92f9

          SHA256

          175639d33600de4f051e1b0e3791a5c467098a0b5fc3a7309b0ce33f32c66180

          SHA512

          5d94564877b6dc6ec4911bb5f1a6b698146f611e39fac50738227fd0063f3a0c3841508e707c2f0828740d6e3b093d619cabaa5b7064fd66658502e71e6a1ab3