Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 09:36

General

  • Target

    7135a6c4b094fd37fce906e82d53d0f0N.exe

  • Size

    49KB

  • MD5

    7135a6c4b094fd37fce906e82d53d0f0

  • SHA1

    e4c5b44f7743115ed783d1940a6a9e67c63d21ea

  • SHA256

    aaba1629c5bdc0cf2a47a5aa795af1bba28212fa6e18f6e782e2021f1a19cdfa

  • SHA512

    204d6e5353f7088fe7e2bbce7a2c2e139581a32f80cf4568f3a8c881690a599ad5e708606023d8623da26bb4d1b48fc88556561d52d7a024bc6679a5a8e7d59e

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LOd+QR5WAnWAi:W7ZhA7pApM21LOA1LOTRjti

Score
9/10

Malware Config

Signatures

  • Renames multiple (3350) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7135a6c4b094fd37fce906e82d53d0f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\7135a6c4b094fd37fce906e82d53d0f0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2172136094-3310281978-782691160-1000\desktop.ini.tmp

    Filesize

    49KB

    MD5

    b83df0226c90f1d96f4df40a3395f86e

    SHA1

    0e00af3265084ba2baa9d0e7d180592766e1f74e

    SHA256

    f2f16f662c4e915843dc1e75340c3dcae8affbaada47644a6df6ac01bc9a1a74

    SHA512

    0ddc6aaf1c50ce3681769950d3007a44c2783e4921480e95a323d4144c77cc00c81138e6f6a393b355a80525a2668fd134844867bd723e3d51e6324b4eba6c9a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    58KB

    MD5

    6e6fed940cda19d0a27baddc5d88c0a8

    SHA1

    ea657dff92d4a30fc7bcc3dfdc99652639193a64

    SHA256

    b6fed4dc87dce1a06f0369a2e92159fde7fa6752dfbf3bdf46bd7dcee4db3ad8

    SHA512

    19851ee600bfe515f9c8964abbf019cef86d2390263ec4cf4bc1f767983a04345c1197dfc060d9d82cf2a71f6cdcc50fec039b5635585e5af8a210ca9641cbb0