Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    04-09-2024 21:24

General

  • Target

    858da43736fc1ec0ce87c0072af030c0N.exe

  • Size

    52KB

  • MD5

    858da43736fc1ec0ce87c0072af030c0

  • SHA1

    bd326794db082f00dc8c700b538747709c640bb9

  • SHA256

    43b07052d2fc62f3174c1a819bf00666c4a4a6a5f8b069c1cc11a70d85360daf

  • SHA512

    8531fab9619da8273b4f0cd1e72b5f227f125ac0548806d649acdb3aa5890bccb3ade4b12d8616a968d9ce55616c96562e7db5032766f3eccbf08d0c59ebdcf5

  • SSDEEP

    768:W7BlpppARFbhHFoqAJwBqAJw1VyjVy/VeSFgZg6:W7ZppApyVyjVy/ESFgZg6

Score
9/10

Malware Config

Signatures

  • Renames multiple (3247) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\858da43736fc1ec0ce87c0072af030c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\858da43736fc1ec0ce87c0072af030c0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    53KB

    MD5

    dd8478a5790f91c3eb7529c079be0153

    SHA1

    04e4f812a04fe81cfa2ec6ddb79a714f3f21f26c

    SHA256

    02cb65df6a8844402ff1a54b174a9f8d871d1bffa1d65a5d1c066f7766939c25

    SHA512

    d10f8640325f449168624c1758fd57fcc26779963aa691df0811faaf10fe2f12ffd9ce659a54fd45902dbdd93fc5af5b7b1d96f3027f77b72add5a8f984c6482

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    62KB

    MD5

    b7f6fc197e4982d831edcc5b0879b064

    SHA1

    99d92b7bb63360d45159093a0034a71d28ae69fe

    SHA256

    bb82d414c60e798a58809e795ea9d425425ea16a83a6c07bf478aeddeec1acc1

    SHA512

    92ee4688eca4dbd43dee7d896f4c67ab97d6bfb85ee9dca29808a3e17decb0f8ef061775c3748c77f72513ff143e4d6bcb7a8e2c39136cc31a4b3239992e5b82