Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2024, 04:12

General

  • Target

    1692f5add1df453799159ed8611014d0N.exe

  • Size

    62KB

  • MD5

    1692f5add1df453799159ed8611014d0

  • SHA1

    cb2ca5b868e4e4f5d1d7e9f08d390b7b01b5ba8e

  • SHA256

    d0bb1ea9b40d3c352fb1ea1b117a4b886c04e906c792f2cf038fa23d1a2b866e

  • SHA512

    d36205bc04d5ad91cdbda7536be5ccce60e203f52d4e9ef0b2aec5555a0f7745b83354758fc9d8e97fe29d982d1820977a9bc91a5b246618f96dac3ad808702a

  • SSDEEP

    768:/7BlpQpARFbhn54fmiy+3BVr54fmiy+3BV6nkSO1w:/7ZQpApmi6nkS5

Score
9/10

Malware Config

Signatures

  • Renames multiple (2973) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1692f5add1df453799159ed8611014d0N.exe
    "C:\Users\Admin\AppData\Local\Temp\1692f5add1df453799159ed8611014d0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2572

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

          Filesize

          62KB

          MD5

          72f594705b334e9f91379dde4a0832f0

          SHA1

          72bc8563b0575eaaa3294a21a0b70fb6c4f7d66f

          SHA256

          c55a965baeece01c1ef52acdd434364f4812c63e0146d9426e32b157949cd266

          SHA512

          32d20f3abaa567296a3df6b47fe948d9de690995368d7babdd2f4acc8c08a98449cf1f48463b71d07f5aa9e854d0656f8dba0542cf0bb459122f904a663c522d

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          71KB

          MD5

          6d2ba4cb831c4bef4642c5b49c898924

          SHA1

          40414caa6b471cdb5955ade4f53221494be221b6

          SHA256

          09bc14a2d7e50354cb66479ade87fa67b621dbdc13657be80c4706a29017e2b0

          SHA512

          53b076360c06b23468642be38184caa4ec96aa202a15af745121af593b86ddfb2f61978153a71e8249e0c97e9c36c1a0bf890f96ef72f5d75ec9c03106b60832

        • memory/2572-0-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/2572-70-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB