Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 13:12

General

  • Target

    61ec757278070446c10acd56270cfd70N.exe

  • Size

    48KB

  • MD5

    61ec757278070446c10acd56270cfd70

  • SHA1

    7c28739316ac93c172d03665ea77e43a747e7c69

  • SHA256

    9513be314bb3d7cec19a460b8b551d00b1ae7030706cf66462d8527c8ed91181

  • SHA512

    2e81fa859c763405420a649a886da0e946a1df989683e6714fdf29f9972b4694a8c6ae1c4dca8681ae4371b873033e7ecfcab593a5d56be14444c46c1d51ce1c

  • SSDEEP

    384:GBt7Br5xjL9A7AgA71FbhvnIH2YsTKnKqtaW3W4:W7BlphA7pARFbhvOsTKnKqtJ

Score
9/10

Malware Config

Signatures

  • Renames multiple (3259) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\61ec757278070446c10acd56270cfd70N.exe
    "C:\Users\Admin\AppData\Local\Temp\61ec757278070446c10acd56270cfd70N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    49KB

    MD5

    dc095ac8d6fd9e88c754177e4683cacc

    SHA1

    bb41c6c1bac8ee02a0fba0c8bd8055a50bd7def0

    SHA256

    03dc6e5457bd55bd9d83a6ab163f936f489a4cc4121ec6c00f2799f3fc81a87c

    SHA512

    11c4e0e67fc6d82e16617159242bad810f25ad6c38d10d22c402d09ba499005769e28d4e69307dae15638dbda6701a0bcd96f693ed06110355c9a75ba28b17f4

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    58KB

    MD5

    b70c0395d05e519c0c3b89e14d8eca8a

    SHA1

    57c28d49857c83e97a789cce742356d36f4ce61f

    SHA256

    a697f33f79557c8ffd53131cf40a00630c057acbf709472dcc2e0b0c94e19760

    SHA512

    44dc7c6688c263308b71582282f1e7aa19d3e886feb479667109d06ef915b36c83c850b252a0f69e00784ac591472e550039213cc8686785ed73c5d572f21ef7