Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/09/2024, 11:45

General

  • Target

    156b8f1635681b835b9995f5920d5b30N.exe

  • Size

    48KB

  • MD5

    156b8f1635681b835b9995f5920d5b30

  • SHA1

    38cda631e8784d4b799f1a92cd014ad788b0febd

  • SHA256

    47873126bd49e39e57fa019ad53b5e82c57328bf8e0cb1316c15c2404b2f0737

  • SHA512

    1b104f1c5ce5bc8521f9a2bd23d72342d215b3d0dda3e6f94012719ee7b1c49d0ce4fa0646982d4af00ca7863542dabfd9c6ef1da1e06e5bd5f44e03538648e0

  • SSDEEP

    768:W7BlphA7pARFbhM0KW2s9B4b09Xgd7jylZqzpvfw:W7ZhA7pApMaxB4b0CYZ

Score
9/10

Malware Config

Signatures

  • Renames multiple (3149) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\156b8f1635681b835b9995f5920d5b30N.exe
    "C:\Users\Admin\AppData\Local\Temp\156b8f1635681b835b9995f5920d5b30N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3004

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

          Filesize

          48KB

          MD5

          fcc159b76ae072b06b068816953cb2f7

          SHA1

          f6926d728c900f4b9a34990ac4bc182332f6c605

          SHA256

          7b96525efa6d85042f5192202ad91d792d957c15089687310051f10f77001391

          SHA512

          0a337a20985534bf09a3a2f500e196a2db4c5bdde48c69c9adef11dfd3d2b88e6530ab27ead9f6ddd334704080b4392e4674238860d5f6c8fb90fb5e28717450

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          57KB

          MD5

          fc83e3e45256653f6615c17331159c11

          SHA1

          a2345129c644007e187973a926c650c2aba4bd71

          SHA256

          57d079d7ca1e7e1efd028ed86b77ba6c7caa6f123d9078eb42b0f4801b6aaa18

          SHA512

          c94de4aa2195cefa97a6ea71d79166c0276eae526889ed000a2cf7932d950528806fdf1fbfb481aae28170e00c6f78680d283763f1281aa6e353d194dfffc5d9