Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    24-08-2024 06:29

General

  • Target

    860239c1aa6dfc6cc81405b3dad5b630N.exe

  • Size

    81KB

  • MD5

    860239c1aa6dfc6cc81405b3dad5b630

  • SHA1

    39cb908ad023b6500fc1efa289e6dc11cfeb943e

  • SHA256

    85532de1d1a08f6a9f991a0d2f8d211975c596ab3bc52f3e02d3cd3dd310d304

  • SHA512

    20ec9a9aaf90d56071bddde59395d42384a1fc45fda7ed8034dbead38b5dbc1d80047470076eb6d342de2a9d3c8a8e9d21c351714a69f046af1c88c2a41a3499

  • SSDEEP

    384:yBs7Br5xjL8AgA71FbhvJUfWGUfpa4ma4LGXnlGXn801E5c5Z0BS0+O0BS0+N:/7BlpQpARFbhiWbWYZuE5c5240g40i

Score
9/10

Malware Config

Signatures

  • Renames multiple (3107) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\860239c1aa6dfc6cc81405b3dad5b630N.exe
    "C:\Users\Admin\AppData\Local\Temp\860239c1aa6dfc6cc81405b3dad5b630N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini.tmp

    Filesize

    81KB

    MD5

    505ac30be5cf6a57d022d7a6d67af101

    SHA1

    d0583d5dc61c3438348d5a81c90adcab0b316e9e

    SHA256

    230c03ae550d891905bd939ff7fcdddad6f9b2b4842bdf32f6d8ddf33b993832

    SHA512

    ad258428b5d12c0e0c95cee7dd45a1b9664018a6c1415d1d611bbbe0daa05cda6e09bbbfeacce2cc59ca88cd23b520e53c091b8bc5f0a613e7d08e14cb1fa350

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    90KB

    MD5

    0c36d9cc67599b6d4889e55f6b465468

    SHA1

    8ca734627c8950ab15b178e737e9b02c3371b46a

    SHA256

    9b74060c50575fae5b344f1674cf2919b0dd1e86d49ce8d4b8b85f177c7a832d

    SHA512

    5ea3e3d9675d316e139d6513d22b65a38b4580977816c0b940edb670ac1202502f63443e95ec8aa1a9e24d51ad4696e7fd15e8702f6f251d04199ca454713380

  • memory/1940-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1940-70-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB