Analysis

  • max time kernel
    120s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02/09/2024, 13:57

General

  • Target

    110cba95828c278e3019d18186839270N.exe

  • Size

    87KB

  • MD5

    110cba95828c278e3019d18186839270

  • SHA1

    46559b54d49a235b9e9a6210f8909a935ff56629

  • SHA256

    13e34fb0bbfd9fa659c36bfa45180a3d13f076c0f75f78b8241253220b45969e

  • SHA512

    551d3760585d07fbb0265716a2a4005719023caafdd515fa3adc123217cb2aea843b2e0ee54399fac74512bb6fa73c170c8e894417a082f2311fa69a5da23414

  • SSDEEP

    1536:W7ZppApUFpEhLfyBtPf50FWkFpPDze/qFsxEhLfyBtPf50FWkFpPDze/qFsAcEhP:6pWpUFpEhLfyBtPf50FWkFpPDze/qFsu

Score
9/10

Malware Config

Signatures

  • Renames multiple (396) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\110cba95828c278e3019d18186839270N.exe
    "C:\Users\Admin\AppData\Local\Temp\110cba95828c278e3019d18186839270N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

    Filesize

    87KB

    MD5

    f3a3ab36fc4c45ac3d89c000843a5616

    SHA1

    d58da1a39fee7f6d0b1bf4059edf65df1f4645e6

    SHA256

    aa747f9b41f3a1f6e5db3b690bd442c7e09b3f226a54a1f7509e43522f4c8996

    SHA512

    0e89ca79bc12ca99d508e09e09adb7595c22668ba652f85eb96529f385d5deade7b7ca7722629868711a994bede799e87551c687f24a1f68161a3646a50308ca

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    96KB

    MD5

    6265a879293effeaf5375592b81d21d1

    SHA1

    0cb69553cd4850deb99fbfe758b75d37dc71adb6

    SHA256

    460eb974f299171672d7b263f15602dd0970a5badc36527b14479e17118f5569

    SHA512

    ee2d2b3037ac936ffbc55e0a20e12ad91ed48f032648ca46c931f6bd6b3b3e5271e005246c8cec061681f8878eafb61c566cd338adc3e0562106c15586d84c74