Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 01:53

General

  • Target

    77abb53531d50eb51978c50900389110N.exe

  • Size

    40KB

  • MD5

    77abb53531d50eb51978c50900389110

  • SHA1

    9ae67de6fcfaaa9c12f094d8cac87f82eeed2c82

  • SHA256

    8c3ee07a2cc3fb2e41d81610117c1f574b0327ad512c0b1c5458835c7bb9e048

  • SHA512

    ac11bac18af518af748ec6871b8a688355314ca697ebf3ba9bce4ffdbf433635e6f4c53db42988772bbe1e19e276102055251f52d3a86ca35b203c0ed4f5d660

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42Lcfpb2N231F1n2pqpc:W7ZppApBULcfpHLcfpSo3fewc

Score
9/10

Malware Config

Signatures

  • Renames multiple (3229) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\77abb53531d50eb51978c50900389110N.exe
    "C:\Users\Admin\AppData\Local\Temp\77abb53531d50eb51978c50900389110N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    41KB

    MD5

    e791124970cb02ecc80e7467667a836a

    SHA1

    d27cddd18133dcdd0c21a617dbf1fdad5da6a6b7

    SHA256

    cb5079c605328cafab9202e5029b878d96d63bf63071066b079e5fcc32e2f098

    SHA512

    d80158593cf4a3e91b2cd06129fbe55522e6c39177227d5dc76eafce0ef82a0dbf16d5e5f1ca1cb37676d33872c6ac786e906155d687ec2f99c7ff7310fa7de5

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    50KB

    MD5

    857b7e7b866347b1d81a97970e35a2c6

    SHA1

    bc81752de9d17920fccf0ed332c93a011cb9ea41

    SHA256

    5d943958ffbbd9b049d7c6c3e99fa64a4460e60273cbe4f1111315409124beef

    SHA512

    186897dbab8f8f52f0594e2486b9f1a03ce77642827cab9d2a2cf8f643b6998857be05f2fb7d949f969c235d5fe20b50cfa3c169085cf68329160e0d3ef46078