Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 19:14

General

  • Target

    2eb6f0966c771e8b9333377ceda00eb0N.exe

  • Size

    58KB

  • MD5

    2eb6f0966c771e8b9333377ceda00eb0

  • SHA1

    7bbbb65d9dd7fdf97dcdf1bdb9d4fef73e62eb5d

  • SHA256

    cb2d156ce20210c89aa8f0e8c8da3faaff498a12c979515da3b3eb5922005955

  • SHA512

    ae004b279a9907cce2323f15b1a41bbe138dafc850cd3a5f1c172d06947928b2c45fedb2ee338e6b752ff92703f976031d67b08106cf388d23f55a1dc6b7ae96

  • SSDEEP

    768:W7BlpNLpARFbhblkYlkrt8PWGoPWGqMs1MsR5nd5nyQG+QGs4U5W5Q:W7ZNLpApCZrt8PWGoPWGANdNyky4GIQ

Score
9/10

Malware Config

Signatures

  • Renames multiple (3348) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2eb6f0966c771e8b9333377ceda00eb0N.exe
    "C:\Users\Admin\AppData\Local\Temp\2eb6f0966c771e8b9333377ceda00eb0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2208

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2257386474-3982792636-3902186748-1000\desktop.ini.tmp

          Filesize

          58KB

          MD5

          004011ee0f246338b7bd4e0696f0be87

          SHA1

          f6dfc90e6a9d0729d00fb2925c143d4c6fbb0aae

          SHA256

          3d1947d13930d59c4a1c1d594f8be6d32b54e012b39daee3d55bd701de05c5d9

          SHA512

          8355f1879b37f3f923d2afa422e16bb46b3359498def62d9572ab8c7559b0012d39d0b5746319cbe5d29b23bf289c78f941299fbeabddf90735a7919958b9806

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          67KB

          MD5

          6f62af761a3f71408c7c46393fcf21f7

          SHA1

          71ebb570b2b65d2aff301d50679073c75dc1bacd

          SHA256

          94bfb1226f4813ad97a016ec1404334246af3a23baf236a6547d592973231f9a

          SHA512

          9dbf905e963fee54aef665ebcf14925de0a456058693b7a598a5dc347602f1e1f5dd745de72dfaee81b68dad49635d11fdaf39fe091a4ad3cec122e0f7e07865