Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26/08/2024, 03:49

General

  • Target

    178034249480e03be8087360f647aeb0N.exe

  • Size

    48KB

  • MD5

    178034249480e03be8087360f647aeb0

  • SHA1

    4cf7749802a27c677a391f677d76a634fd1d6314

  • SHA256

    60024c3be67250f6a9b02ff829f4972b96e959eabab7a425c9ff6d2c55818032

  • SHA512

    9970ba65bad9fe4d0ec55ef876d1dcff0fbaca5d14897850731dcff3d72cfb3d18bce1e7366e6390e356183d03942a404769014f04fac7f357a5b61811b9a9b7

  • SSDEEP

    384:yBs7Br5xjL8AgA71Fbhv/FzzwzgTAUAcfqg7Lvxw:/7BlpQpARFbhNIgVe

Score
9/10

Malware Config

Signatures

  • Renames multiple (3359) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\178034249480e03be8087360f647aeb0N.exe
    "C:\Users\Admin\AppData\Local\Temp\178034249480e03be8087360f647aeb0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2504

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2958949473-3205530200-1453100116-1000\desktop.ini.tmp

          Filesize

          48KB

          MD5

          39bdcf905d62bb042c91e65eb4bb691a

          SHA1

          365d2071dae81d2fa656ac0feab7953c3cb207e6

          SHA256

          ac30f15c07c4b7451544bc6c668baa973c09f7de353aba0c832b78fbde5db34e

          SHA512

          4a459fa5382b70bd468863fd03cef75b3738d98238e6e768f14c1f27bd6b294f192fc8cbd32c1c4918c81e36a75e653a5496d6e78874cd46db8c7c4a2c7e5d96

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          57KB

          MD5

          a51109f912cfbfd7a1159f153530cd77

          SHA1

          ce2b7629cdeeaac4138573529d77b403bcd74f67

          SHA256

          0ca0d5e68c5c55cef56a875b3b7bf6f82a3ace964b9da23c630149b5ecc1216d

          SHA512

          867965485c4eb6ebe490bbee494e94d99f67cc1877793daf1b4d16deb352416107ae87066ba9208cb93dfb5235bda8f8dec53c26305b0f6f6d6b41e200da187c

        • memory/2504-0-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/2504-72-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB