Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    24-08-2024 07:15

General

  • Target

    60edad5856cf05fb048a707abb2b7ae0N.exe

  • Size

    38KB

  • MD5

    60edad5856cf05fb048a707abb2b7ae0

  • SHA1

    92ae7eb9f5d91a10d0a03660cedbdefb7a389af6

  • SHA256

    61355292049e8458fd908ca34b5bbc5a6da6e0ac83bc960752812a861b6baf04

  • SHA512

    4c1ad30a05e780f712a45910053e8a5381d1e6892c79363bc318e410de36d8fdb81ff91c28c0c522ecd14029f6dbca569543269a0e45221ae13fe8d296932800

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LOl6Sl5lsS5EBIEBU:W7ZhA7pApM21LOA1LOl6vS5EBIEBU

Score
9/10

Malware Config

Signatures

  • Renames multiple (3326) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\60edad5856cf05fb048a707abb2b7ae0N.exe
    "C:\Users\Admin\AppData\Local\Temp\60edad5856cf05fb048a707abb2b7ae0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    39KB

    MD5

    b6a0604cc4e4a2357fb3578504cb4c5c

    SHA1

    a776cc0988bb916ad91473f213e2b6e692796f99

    SHA256

    bfe8bb56c5b3855541edb7d79c0a0840150534d9fc0c7ac1a0e77627edb8b343

    SHA512

    773b121812ad28b1162732c04486ac653bab51cf1eab580470eefd260806e5b6a4e0ba002e806c435cbe28605d32f3145c97df60393588640e2b524fe4784d3e

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    47KB

    MD5

    4f59f0c4ff75400c33546530468ac9f4

    SHA1

    34cbec8aa2abbcd9aea900c0528b4a890b9c52b6

    SHA256

    3ebd75335c8bda260678aeceb544f9d68b52cc6c0e9f612c956f22761b8fa35c

    SHA512

    009050ecd6a589aa666179a432d8c8c84e61c194b68c8780a0cf3ae2dc779bb00a49943b020e5c2e45acc953f306f625f091ed05ae659a26e5a5941e5d0cb613