Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 15:21

General

  • Target

    2621cc0e0fda53d6acf4bdddc8dda6e0N.exe

  • Size

    66KB

  • MD5

    2621cc0e0fda53d6acf4bdddc8dda6e0

  • SHA1

    851e6baed1b614e6092b2dd9e508cf3eef9649fa

  • SHA256

    5923db14d94bb760b5b76c14e27ef5fde32fde15ea621b7d55de56e86bb048f4

  • SHA512

    8e2ff324ae9db196d7d3463a7027f321ca40faf9d628ca369c454f14f165928f52d4826248c6f8beca404d50c9d80c4d69f8e62f231f069bc57f8e3b5997024f

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfpVF/MF/3Nw/Nwk0cEMdV8IEMdV85/EUNUSu:W7ZppApBULcfpHLcfpX2/Nw/NwmxRSu

Score
9/10

Malware Config

Signatures

  • Renames multiple (2924) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2621cc0e0fda53d6acf4bdddc8dda6e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\2621cc0e0fda53d6acf4bdddc8dda6e0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2332

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\desktop.ini.tmp

          Filesize

          66KB

          MD5

          48a868aedadf936ff19b7fe0c49b8953

          SHA1

          e5dc0963b1346cde6f4f163f92c3446da4063a3a

          SHA256

          9cf166d70e6d9a00285ee2df8d4966991bcc9f397905979962c43bd415066fdd

          SHA512

          88e60ab588f9095634526cca3d2d1ee3e049b1c1314961c7260bfe85117b76e38c1325610eb430716479d1d57c3fa1c01a326a1d96bb1e491bdd4f24847ddcb9

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          75KB

          MD5

          381225aab850f64d9d1874fffa6cd83e

          SHA1

          18a2e3b01ed5cf1a9f2edcea43a8ad12ae8bf487

          SHA256

          96bf5cbb2d33807a71b9e28c7902e7871978e38d7aaad2d536e6b4dd8bd64462

          SHA512

          2809d5f239dbfd66d31aa6cfae34e10b8a42a32ca30c1f81b7befea9e4423679cef290e8f14670323dc165d6e610ed5a8a96d5a00ee08f5a6fc9f4e7e3c3dcb5