Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    02-09-2024 23:21

General

  • Target

    d121d83938b75ac4228fc99d8773a540N.exe

  • Size

    78KB

  • MD5

    d121d83938b75ac4228fc99d8773a540

  • SHA1

    bc03eacd18938af1ec42765e752b6cc6a7d5fd11

  • SHA256

    2988a99257b0cad1aac87ffe7abc2abc2fb3887646dcbd06ed4f5d7eeab8d94c

  • SHA512

    433c5c338214ccd4c3e8359091b37bddfd36515675deacbe176e0f51d5a8ea5db21bd79bb195508bfd6552b23d4010166c388c7335bea35b998693d4cbbc65c0

  • SSDEEP

    1536:W7ZDpApYbVK4vx4PN54PN4OHepOHeZSbM1mM1l:6DWp7Ww

Score
9/10

Malware Config

Signatures

  • Renames multiple (3249) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d121d83938b75ac4228fc99d8773a540N.exe
    "C:\Users\Admin\AppData\Local\Temp\d121d83938b75ac4228fc99d8773a540N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

    Filesize

    79KB

    MD5

    43d6e7cd8420153479b8f9e56e0d96d4

    SHA1

    337ed1a37acb1f833d439fe0f1903c59c5c37caf

    SHA256

    0ccfba0125d0c7ba59e18bc9814ed4c5f98dd25285a0bf868d1a2c0a1f6b1ac1

    SHA512

    63b9489f1d8a134fe54ed25556918847011eef4ac0991192c014163259477aeb68bae0109521429ed2a8141d2f830fc2835f6ca5e4a7f357ab690ade8de9c6c3

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    87KB

    MD5

    f0b7f1a3f1073d8e87e2e6892dc72336

    SHA1

    f1e55580fd5f554c1f12a373342bebd5fdaa2b00

    SHA256

    1d3d7d1cd72f65a8a1b30a52592924cff0f4c404fe5bdf98212df09b805353ad

    SHA512

    16933b501d08f3ba1d298fe9193692b39519666a961ae4bf9a661bb89e0542fb44500e68b5e91a627cd7f20f5d98100f34d82d397f869008c1a9980f3c37f0af