Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    29-08-2024 01:41

General

  • Target

    5340e34f8b68dd797c33436a24c24e20N.exe

  • Size

    45KB

  • MD5

    5340e34f8b68dd797c33436a24c24e20

  • SHA1

    17d75e27be84d48855beb43563a3e373516b44f8

  • SHA256

    21952fc82d1a06f6679f2ce67c0068147caad94d12eb1dad8a0a36ca91f98803

  • SHA512

    11f437db3794b0436cd30dbd3d2efb665bda9e30761f3f224a51782f969099317debccc7ed2d7ebb139f76faaf1f9649f403581d8ba891434f66cf4922744945

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfproFNFjqAJLOqAJLkEt:W7ZppApBULcfpHLcfpyDC

Score
9/10

Malware Config

Signatures

  • Renames multiple (3379) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5340e34f8b68dd797c33436a24c24e20N.exe
    "C:\Users\Admin\AppData\Local\Temp\5340e34f8b68dd797c33436a24c24e20N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    45KB

    MD5

    701daea4d420dfe06b0b7fb315f40269

    SHA1

    3a52ff3aa3e9c3c3bd25b79c7c6016dca2bfe13f

    SHA256

    95b8af06ffe8b79d9a95e92ba1306012d07b8e3faf9480423da3eef8f1ee1f03

    SHA512

    a1df635fcf506ebe8eab9eef3d39da7aad8f22b1c947155a0d3a639611920555877a2f7a29dd88bd5d8e2eaebf5d2a89b4b0f784e6f190fcabae478bac2a71ff

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    54KB

    MD5

    63e64428757ef86119da7e9188641e64

    SHA1

    47d6a52c50ddd0bc47aa0dbac33d4794c616a6e4

    SHA256

    396813bc3eca4d3ca3ea6e97d3ab49baaac6ae14a610da5be3a7f3c24781b43a

    SHA512

    67040ca1ff52f5a7d3692bc4984cb11dbecd4e5acdffea0b91e726a7467a196b6527a2b463c2e7c2813873b2d6d3db10af2c296e01bd9ee56dd0234201a1845e