Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 07:10

General

  • Target

    2523c78b0ae306ff9960a01e47386d60N.exe

  • Size

    55KB

  • MD5

    2523c78b0ae306ff9960a01e47386d60

  • SHA1

    16acbab5d0631b3d756737839acb0029309b6260

  • SHA256

    c7f8408282628b48353f9c5bc9ec4893d8b0add5fc68982c875e4ce3109d9e3a

  • SHA512

    5faf8274bd4da137a29e5cae70ba1c89358fd143650fe60b7ef682d47112d047b042c1519336e218688415f2c1f56da02e43d5fecc592ef8482ad3344410a437

  • SSDEEP

    384:GBt7Br5xjLvassAgA71FbhvgqHqMjL4jLS/3MMf/3MMy0U0czyKbNzzyKbN4HQew:W7Blp2sspARFbh5YSfffynfWK9WKWQr

Score
9/10

Malware Config

Signatures

  • Renames multiple (3190) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2523c78b0ae306ff9960a01e47386d60N.exe
    "C:\Users\Admin\AppData\Local\Temp\2523c78b0ae306ff9960a01e47386d60N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:348

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

          Filesize

          56KB

          MD5

          4c91761753ebc1123b780e35fc6d658e

          SHA1

          171a6209d5c0730f192ccc3540d2a9df78cc5464

          SHA256

          a685ee7eb64dc3f5990e8235b039b77690c537b2249621bd33e0b0117316b9ea

          SHA512

          e41ec2ce844b0e2a6903966678e34c05989c4b441d9188ea2fd963ec1fc5afd903b4446ff13f5732173aa6e4099b84212f8be76a1caaad93f6b0d44552b357e1

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          65KB

          MD5

          5c7babc8ed4a21b7428d47d923214110

          SHA1

          58fd57ec1b8c796464a93b97817e511a487684f7

          SHA256

          8a1f3ec4f463ecb3e3b05c6c04a5e4ff1bbc59f6721102cff831f0445529529c

          SHA512

          cc5a63b918bb12e2ae9475f21972dcdc43ac4fd75b98a1f1f7a7275fe0535193aac1d3dc1aa8ff91b4594ed472af649ac4754c202fa3d20de10fe97d186be68e