Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03/09/2024, 11:13

General

  • Target

    707c02f41a38c677c0010fa9c283d200N.exe

  • Size

    65KB

  • MD5

    707c02f41a38c677c0010fa9c283d200

  • SHA1

    955b5640831a4b88f3a3959ec7218475811b2961

  • SHA256

    bb7201dafac7b6c58d0e5176c9ff6d8f3873cd3121b56229630fe68b499400dc

  • SHA512

    8cdf03c59985c803fee37b78291df114f8962c4034cfaccc3817af45339f27889f99f93b827dae46aeddc3f72f63d4627f53a51fc49aadf6ab1de05d835b5ac1

  • SSDEEP

    768:W7BlphA7dASbSjJJ1EXBwzEXBwdcMcwBcCBcw/tio/tiHoGopdwEbdwE0wsItH6Z:W7ZhA7dABJJ7TTQoQIdwEbdwEZsItH6Z

Score
9/10

Malware Config

Signatures

  • Renames multiple (3091) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\707c02f41a38c677c0010fa9c283d200N.exe
    "C:\Users\Admin\AppData\Local\Temp\707c02f41a38c677c0010fa9c283d200N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

    Filesize

    65KB

    MD5

    bf54ea5bd57585a2861d8306a9aa099e

    SHA1

    9a55b855119be3980d7cef84d4e61cf4ed0ff5ca

    SHA256

    9f016bdcf80f5ce27a2662888e6b93ccb6a6c01b4c05bdb51abf63df5e0b960a

    SHA512

    45c51be1cbafb8106da85101eeb9b691cee6f09158f69a810c4a01c4bb432b3a0a10a5b62c7e30c3050ea4f45c473b38e63ab2e58922575414725b8ce5192657

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    74KB

    MD5

    4ab890962bc06495e3dc43ad65008870

    SHA1

    b335b13ad87e1284e5f61a918feaa142f345c820

    SHA256

    0678532a153aff9b92c56331803792b91fdc1e9ccb6a2de422e6ce93bc33f324

    SHA512

    18ace4e95175434f9b5f7ec03928eed357298e6b58695387ba321fa9314f134a3d669f345c6985d433d844fe043a44a65721cc0a5f56e6612fe0f240e607229c