Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2024, 18:35

General

  • Target

    db1c728d92e6e0adc7b303286d43f580N.exe

  • Size

    49KB

  • MD5

    db1c728d92e6e0adc7b303286d43f580

  • SHA1

    2114addf7f7ef54a003a6f01bc71e778e2ba6997

  • SHA256

    7eed1bf9207b97ea0799b9d6764840998fa64dfcc4b28a310a1c6b35590e97e3

  • SHA512

    e022b0c6c85f8ab01a85584196a38e98a39d126cb2c0ed923a343f03df6680e3fe6ca519e08f6905c9ed53a1492b99429d634afbcbb0d5e74553eaf5cc9bfd4c

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LOl6Sl5lsSwVEVrTfdi1x7Tfdi1xm:W7ZhA7pApM21LOA1LOl6vSBTo/Toq

Score
9/10

Malware Config

Signatures

  • Renames multiple (2906) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\db1c728d92e6e0adc7b303286d43f580N.exe
    "C:\Users\Admin\AppData\Local\Temp\db1c728d92e6e0adc7b303286d43f580N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2232

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

          Filesize

          50KB

          MD5

          d9a5f1f8b3cc7e717b85b73219e7e711

          SHA1

          26f6cffd860b9c2a69159e4c33260f2d8a98b108

          SHA256

          cd182285e9d028fc575abedc91f071bae2bb2da6a2af40f895b7a9dc8a6d193a

          SHA512

          a304927ba1ed24c4a696c839e31013ffb55cab3648eb25310d1738823686730621ae35e0d9e68ebf981c5e157feddb840b8fbac34e2058802782ed0fae7527c5

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          59KB

          MD5

          8c84b29948d5e725f8b62a4543ac809c

          SHA1

          5cbea6d110b75bd3dad2c7a81e6f35a2602f3523

          SHA256

          2b9bb0116bc4db2e4ee7aab119f4cee310ecacf496cb6b752e05ef01eee87ade

          SHA512

          01f2330eb5c6881f59c46f07ab7d6793ccb3581ebf6544121b2c6fdb7e897dea1bc4eaa5b84558f0cc5118df0fb3ad7ff4cb8acc157a30a90eb0a0dce4146025