Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2024, 04:46

General

  • Target

    dc60f39638294b914d9ed1f680afe9b0N.exe

  • Size

    44KB

  • MD5

    dc60f39638294b914d9ed1f680afe9b0

  • SHA1

    95936aae9cef63d4b0536f526bcb9e313ca641b1

  • SHA256

    4de1a3690fe3ae0024427b916641b2a9e1b52ac8cc9527c3e2ba73254f8bc3a7

  • SHA512

    34438ccbb081743de202e4226515fbbca5355b3635338e3075f16b80b9f500707127e598d6f91a7bfd8a51fcc8e483d0c6e7312d2c168b2b6ac81f75bb2ccb6a

  • SSDEEP

    768:W7BlpppARFbhjbhQYjY+WyKoIWbsHfySkT5GeQbyi348oWc1RPOzkjId6q8UdrSo:W7ZppApBMyKoIWbsHfySkT5GeCyi348L

Score
9/10

Malware Config

Signatures

  • Renames multiple (3254) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\dc60f39638294b914d9ed1f680afe9b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\dc60f39638294b914d9ed1f680afe9b0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1312

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

          Filesize

          45KB

          MD5

          61d78f1aca743c8cab748968fbf0076f

          SHA1

          37c3ed591d09269c15f7799252998ecd806608d9

          SHA256

          74bbe5d61229eaf225ff99ef2309febabd68eb1e308a7bfc57f70c897e6a8426

          SHA512

          af5e7cd261f08e70c44af79eeca33bd273330dee698d21ec84464156dfb8ca15bc8cdb349758efacffdc1210d4f78277f357d7dc2cd64cb184a0480b02b6973d

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          54KB

          MD5

          15d304b41df0cc50c8769f8f54021f1d

          SHA1

          995d9ad41d0b3f3cbc5dc1298476fbd004895264

          SHA256

          f9d76eb2ab4889c148c590d2b29eca105412bd20752bdb40c8c32e2383c9fb16

          SHA512

          a6d51cdbc31f22d61329b1417c5d6c14d8883870701945eddbe9dd0e20f76e430c1e5a9c7088298cd3d88fe5d9965a2a385fb353da606fcce007b1170e7d5a8f