Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    06/09/2024, 23:46

General

  • Target

    0c2fc7acf8421befebb0e85f726d06d0N.exe

  • Size

    42KB

  • MD5

    0c2fc7acf8421befebb0e85f726d06d0

  • SHA1

    3220bd968d3f15199dc1dd6bc1eb7cb3dabea4eb

  • SHA256

    ecc8b1ae91074d2bcf617b04cb4629ca6a4b7fb7e4e5b4be7f8f1270cc7f2e83

  • SHA512

    b3178b2659d5cac469b7e79c580b7ab4e7f9d4b264a14b1b4fa4e89f8d8d854f7678af35688ddb1d0058e4c3dc62ccb9883c1c57a3257665a7ecb9a7058f7326

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LOl6Sl5lsSl:W7ZhA7pApM21LOA1LOl6vSl

Score
9/10

Malware Config

Signatures

  • Renames multiple (3101) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c2fc7acf8421befebb0e85f726d06d0N.exe
    "C:\Users\Admin\AppData\Local\Temp\0c2fc7acf8421befebb0e85f726d06d0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    43KB

    MD5

    615deaaf61a2f337f5a7ef4789d8ee36

    SHA1

    ea03ab1d04e66e6a5b44ee237304ba8f79c85187

    SHA256

    198721326a443e7d51d8bbe337ed01034c4e7d212418646ff5b7cabd7c81355e

    SHA512

    1eca19ab52b2ee53681d1e9085ce1ecb9e3f834a591937dbca9df6bde30b51ea88b64ef9b2d3910fad744e7d08e27baa7f89ade34ffc0545059df532b2fe1866

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    52KB

    MD5

    f8b1ecee2275138ea56c4a4687bd518f

    SHA1

    ed9e05914d6186c6c472bd08281a7153b7a489ed

    SHA256

    490ab8bccd4c31991aa3d3020f0b3c03a60deebb8478a8f9dc7271a5d63429ee

    SHA512

    48b82a7d1115b7475546a84f1586d5ff75665bde742e931e78abc1606cf7d26f23f9480e50e9c4835c765db7645dd4d7fda506499e8cf86a481a157ecc7bcad6