Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    06-09-2024 16:54

General

  • Target

    22cd910f0324e782c72406de2502bb40N.exe

  • Size

    40KB

  • MD5

    22cd910f0324e782c72406de2502bb40

  • SHA1

    57332faa9429056f6f94c78194f8d48766f38cd5

  • SHA256

    72b1e98a82effa78630c336bf5274da9e2195d66bb14e426e05fb370391be6f0

  • SHA512

    280e41450c4413f8e70a991dca3e1495bf06e96be9f97d84a66ca4b925c39f5e45ca20b2a7f447cbc6a033d60394ead724b6c3bf5277f387c7a8671f56505974

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LOl6Sl5ltf+c:W7ZhA7pApM21LOA1LOl6AX

Score
9/10

Malware Config

Signatures

  • Renames multiple (2922) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\22cd910f0324e782c72406de2502bb40N.exe
    "C:\Users\Admin\AppData\Local\Temp\22cd910f0324e782c72406de2502bb40N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    40KB

    MD5

    af528123614376eb3bb7c3c2494f904c

    SHA1

    490267cb68b6ccc059ce1cba375a3b2c822ce8bc

    SHA256

    08b75232064214cd9429b2ddcb1fc000509561110134258fda9a445f61f2045d

    SHA512

    728c8e0d05dee1acaf5ad7b013ebcdf8ded0ad2a578df60dbb965bce43def291f6bac8a4d1cd9c71d286e50f1fe10711649e9dcdc7a730fee8f4831f22e7b95f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    49KB

    MD5

    2a8c22009fab74b9566d5e46e0d06cc9

    SHA1

    a3aac26d89155e9cd46a2734e704a46723e428dc

    SHA256

    00d869fb26f4a2b9c541c5abc0ae29943f2163d1c72bd0f20d64e68dba17824d

    SHA512

    2df447f5dc195163863eaebaeb656ce79f631e802abcae8bc62a5a402d0f0602d2c9897fb5d5ee8644f0bb1b6d573274058b20d75d27a9091a1e097e38aebd56