Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    26-08-2024 02:57

General

  • Target

    48a2c50a88ee6bff17e1663148953d80N.exe

  • Size

    50KB

  • MD5

    48a2c50a88ee6bff17e1663148953d80

  • SHA1

    6b7e7ed2aafd14a1de9ea50f93aaff7312025408

  • SHA256

    4e2ba6c86c930b377d8d5093dd43de0c5d6ffa54e1a83e31861a864b1a72a798

  • SHA512

    32bf8c2b2961d58295bdfb929717f144f44081ecdc561ec7d5979b1f6397cd61673107e976f531ea34e3f335dfc2e50321d02c99e4a9f6a8695f2b491e9fefb5

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfproFNFXpK5c5khwRDThwRDwfZfarc:W7ZppApBULcfpHLcfpyDA6swXwXrc

Score
9/10

Malware Config

Signatures

  • Renames multiple (3250) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\48a2c50a88ee6bff17e1663148953d80N.exe
    "C:\Users\Admin\AppData\Local\Temp\48a2c50a88ee6bff17e1663148953d80N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    51KB

    MD5

    7811edf0fe50e34d0015ec424560b41b

    SHA1

    c3c2a5ec99913d3901e2888f1ec508dd63b40c73

    SHA256

    cfc349f4873c6d80e688db05e35d03dfe4dd90805254d6a03af4d34caf5c3b0d

    SHA512

    f00a48f243e0a060d581eaf60d1a08c679cd5055ce94a802c8c6fe3629e5b0fee882a7caba3809327bd6d36f2ce11a5f21d0c7ad12588ee3d6cd44b3435937f2

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    60KB

    MD5

    e82fac1a2f3438fcdd321ee3a08f1ce1

    SHA1

    f813410464b998ae8d14bc8283510ff2b74509c7

    SHA256

    2be89dbadba47e8f3ab25e059a5e1f918e2f39f4a4f420bfc3fc67db1c352634

    SHA512

    b59ad7a84e421293d1daa38eeff1d9ff1e8615fa1287ba46d3a47e3fcea5285194dfdacb79c88c676e6e0b57062a15166808c4bee35689f6c5b9c84b3b7c8d9f