Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 07:22

General

  • Target

    c838d10de0e319fe9b23d5fef09c64f0N.exe

  • Size

    42KB

  • MD5

    c838d10de0e319fe9b23d5fef09c64f0

  • SHA1

    6904448f9ad2e871ba6c36b3d9ca2949775a8e1b

  • SHA256

    f839d72604ba5e9914c2696666050ca653bd1f780977bb908dc966b9921a0c34

  • SHA512

    77cd4cef11809edee5340a5b64a138753edec0180ce907b65b8fd3147bad3aea43464fd07ec56f1f4bd04ee95337754c77ef667200d944d3b75c6fe03b7a8694

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LOd+W+5z5/:W7ZhA7pApM21LOA1LOYRN

Score
9/10

Malware Config

Signatures

  • Renames multiple (3461) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c838d10de0e319fe9b23d5fef09c64f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\c838d10de0e319fe9b23d5fef09c64f0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2072

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    42KB

    MD5

    362b6e9e9d3b296de2dbd55b4c6b59e9

    SHA1

    f7917bdea5a40b38a75d837886ae3f82c0ec269b

    SHA256

    c814e5b95bca1aeaa1080435d43646248bff84b57127ed146126a03de27349f1

    SHA512

    5a42ed93d3dfcf0ea53ec3d2e352346cdb630669342cbe60ac2819c251e5eb6abf46ad4a2bb8f8a6ad8743598e93682f57e8ba172c8fc5d3ea8a8b14e5361753

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    51KB

    MD5

    b7b722439c875842c74e64bb12addd7a

    SHA1

    ed2aa0534309ccaae50f37f0674402f23b0d690d

    SHA256

    1d4c6ee7e98081565ed2bf30fc8ade66ea5072c9a68c1583c57ec914511327bf

    SHA512

    ff1475093e80d366b886d884a96548372f191cf8248b48ada26d23f52471dc64b2fb5542717e8cb827ce9f6eadbb8b584212b2dcb6de67e234644ccddee88d8e