Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    29-08-2024 07:16

General

  • Target

    c5652d7a999671abef85eb0a12578cc0N.exe

  • Size

    41KB

  • MD5

    c5652d7a999671abef85eb0a12578cc0

  • SHA1

    2756f8663285dc4cdff6ea88f99e14f5e60388e9

  • SHA256

    3302305bd04b350f566965be8457a2c0c560be7c6e895065457c64bd69275932

  • SHA512

    c41ab828f617bf01780e0b0367a546b0334e94a6ae6d1575f3eaa15ab313b11fbd7838aa29c9126f1de7337f60ceeb163e308d38a37a1d112bf71d0e8527d5ab

  • SSDEEP

    384:yBs7Br5xjL8AgA71FbhvsDYcUYcG0Wp/po:/7BlpQpARFbhsYcUYcgp/po

Score
9/10

Malware Config

Signatures

  • Renames multiple (3417) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c5652d7a999671abef85eb0a12578cc0N.exe
    "C:\Users\Admin\AppData\Local\Temp\c5652d7a999671abef85eb0a12578cc0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1244

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    42KB

    MD5

    37cad82b6230eb55c1ae81f9f5287731

    SHA1

    b13c78472c1849676fb34776f63c5862e5d11b92

    SHA256

    eb5f9ddb8d460f2d295dbffc30c9f3019938e97a0e08cd04eda75bd67b104b99

    SHA512

    fa1a129c61ecc9e49ad6c0d2a6ad7eee52d49b7c7b47fe1ff7d8ee2e83f266c2201082762062d3c9c66d6e61002ee3dee9c89a64669707a52216989203413622

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    51KB

    MD5

    eecbeef0f342016b2ca61a410c5ef763

    SHA1

    d4e672142090b7287d13925f1f13e692e6226377

    SHA256

    43b3dedeea11c068e1b4d135aff88c67706dac6eb1abfb3c8334237983e1c2b4

    SHA512

    780990b9cd063696a2dd20e9e7c42749dbe81b3f9fefd321b45810dc0fb99eea30b4cfc2698f2eedab22a4e53ed7748f3cb718722587ce41f4f750b9c145bfec

  • memory/1244-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1244-74-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB