Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    02/09/2024, 11:35

General

  • Target

    0ddd070df51df08a337ecc2b70b38d20N.exe

  • Size

    42KB

  • MD5

    0ddd070df51df08a337ecc2b70b38d20

  • SHA1

    b1a53cd2d15e0ffc9aac7eae486944ddde524a92

  • SHA256

    e38101985d9ace9c8408d1656c7ee74544b92178d80fd5b89c4d4a9f3d0851fe

  • SHA512

    d715f96d6c9fc0504a86e740d2fa8ecdad614ff6dd26d9ba2ba15b272548a38cadc537e92c0a7a9db545658bb668681e3e2604f7706f8bd10544dfc0746e9f46

  • SSDEEP

    384:yBs7Br5xjL8AgA71Fbhv/FzzwzfgQemyq8gCgQemyq8gsV0v:/7BlpQpARFbhNIRynybV0v

Score
9/10

Malware Config

Signatures

  • Renames multiple (3138) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ddd070df51df08a337ecc2b70b38d20N.exe
    "C:\Users\Admin\AppData\Local\Temp\0ddd070df51df08a337ecc2b70b38d20N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

    Filesize

    42KB

    MD5

    e264462f01228ab751d8488f642bbb8e

    SHA1

    8ba00a3cd7ee5ecde64a60b840916d1c40b2555e

    SHA256

    eb028c3d6c62ca30ab650a8b03fee318166335a42db27ffb9320292187f3cb2c

    SHA512

    8ac1fbf29480bb0b859253c577f9b6d514718ba4e145be5454330ee4cb6e46747aa9a00e094088e6e222a26c93c73d63408d25168fc34bbdeecd8ff3055ca98b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    51KB

    MD5

    d71b24858198de310066dbbdca01d89e

    SHA1

    61e146b55c9fc306129bfaf2ec937a3721251c9c

    SHA256

    30838497a81abbf25bc31dd36d5e79bd3b2d72a97cae793a681faa0ecc2f0d99

    SHA512

    9782f628f9562fa02d7301791429c54adb33a462532dc38419c0c75c3168d5f4911ebdda46c18a06ebedb72537c7338b026ea2ed9cc4ba977b9c60f62b734516

  • memory/2360-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2360-70-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB