Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02/09/2024, 01:04

General

  • Target

    2c938e77d67a28fd5d754b32be920c00N.exe

  • Size

    51KB

  • MD5

    2c938e77d67a28fd5d754b32be920c00

  • SHA1

    a07c84c2f3bfc6ca8decf96a880585781d2ad924

  • SHA256

    7ba2b96892cbd177778a4b382716f35603692f18f1a334e0078b122115058d60

  • SHA512

    662d2d3100ed58339c5feb4c1beab263e6430afdf9d7dc4619cc1779066281ad26771db279ae1aa1ea58e8854e946c22d66dae31ce170dde523b573697d46710

  • SSDEEP

    768:W7BlpppARFbhHFoqAJwBqAJw70EXBwzEXBwD:W7ZppAp3

Score
9/10

Malware Config

Signatures

  • Renames multiple (3125) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c938e77d67a28fd5d754b32be920c00N.exe
    "C:\Users\Admin\AppData\Local\Temp\2c938e77d67a28fd5d754b32be920c00N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    52KB

    MD5

    d486dc9ee48c31d97aeaaac50c563a7b

    SHA1

    f6c59358ccb7bb84b72f2efa4cdf971c2df41e64

    SHA256

    0185602f117ef46edf1b2617e16a64f8306ea8e0750906ab2b59b6e0c4e3dcc1

    SHA512

    55d1e0508ccd57e70f86cbd6395f4d7ce85ceb8211237d50863cf8bbe318360ef89161c6b03f43f7cc3d55b735e2ae8105bb9a08582187e289ecf5107388d1d9

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    61KB

    MD5

    b884f8571e69272e362db50071f47af2

    SHA1

    bb291bb3d6abe911df1318447fb1d1c5f0440654

    SHA256

    643a7114195ab6b24570cd4fa3ebc71f42843010518c2e451bc3dc909db55cd2

    SHA512

    3cee9fb5bc5ed70b5b0b33fc4eb95eeeeefbee21476f872192704a107808fb2810f2039eece171988ed48d76687fb7e946522902dcf2a5794f647e2976ee7404