Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25-08-2024 20:55

General

  • Target

    5becc4d57155a8ce50b7d43f1cc19300N.exe

  • Size

    55KB

  • MD5

    5becc4d57155a8ce50b7d43f1cc19300

  • SHA1

    6450af02bdea070f7d301056a757c92e21e25e88

  • SHA256

    fd97d5328e4c753eea54665777cc2e6143b2608f9a6ec8f9b8a2e4100c1593c5

  • SHA512

    8e61d61c560593fdedcaebfbfdc1098c4c1a1d3296135a32f0f417e99a2ef2350bd8612745ac1021649a0879f5b4475361c5fec1a9cd6953e4c638c14f8b500f

  • SSDEEP

    384:yBs7Br5xjL8AgA71Fbhv/Fzzwz72Jwuq2JwuR0U0IwDxtDxoASjSPC9bNZC9bN7:/7BlpQpARFbhNIiJwsJwwnZIfE+69e9Z

Score
9/10

Malware Config

Signatures

  • Renames multiple (3232) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5becc4d57155a8ce50b7d43f1cc19300N.exe
    "C:\Users\Admin\AppData\Local\Temp\5becc4d57155a8ce50b7d43f1cc19300N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    55KB

    MD5

    138e50cb91885fce80929d04c820b58b

    SHA1

    2b444f04ef8e9d63bf426fb8523c2e7ce486f44e

    SHA256

    dcd399449b7c93965476a86b82043093494c27834bbc0da09f6465a3c8d477e4

    SHA512

    00c75e51925adf0bf211a8b38751a891dbd0f5b450fba8ac75cce8262ec7f216f903e6ec971dcb77cfb7c3bee3e4fb674eebb7ceda4be01d5b5a2f839f5f3597

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    64KB

    MD5

    65fcbda999f868f511483e01c37ee63c

    SHA1

    11cf77eb420e9fde2e70ac983f0098252a0e1092

    SHA256

    38d9c5b01beed34e33f267a0d7e376303a433c9b623ca9899e0534d7ebb10cc1

    SHA512

    229dee596434c9c1e66d37d1f51731af70180c7566b4581361c8e746f393a260cd543f20acb16748d13f84e6e235c4c884da1ae185d2f81ae37eced408de6c8b

  • memory/2908-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2908-72-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB