Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 06:00

General

  • Target

    23a5a98a711029bd11c99dcc8c308870N.exe

  • Size

    94KB

  • MD5

    23a5a98a711029bd11c99dcc8c308870

  • SHA1

    09c72bcdb32ada2b8a8169a99c6acc85cbad9810

  • SHA256

    b3df799ce9ea3816db64ae2eb37d47ed15be841b0ac23d8331d1cd3d11f14a36

  • SHA512

    6942486a24b674ee846f5104a76df885b6555bcff97f96f4f9a90207cf4f27e32f9bc331caaf4b015d865fef458a3021575998afaa7ceb182b6068fa8d2e4a63

  • SSDEEP

    1536:W7ZppApUFpEhLfyBtPf50FWkFpPDze/qFsxEhLfyBtPf50FWkFpPDze/qFsAcEh+:6pWpUFpEhLfyBtPf50FWkFpPDze/qFsn

Score
9/10

Malware Config

Signatures

  • Renames multiple (2954) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\23a5a98a711029bd11c99dcc8c308870N.exe
    "C:\Users\Admin\AppData\Local\Temp\23a5a98a711029bd11c99dcc8c308870N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:996

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

          Filesize

          94KB

          MD5

          4383890003ed2c9c32143f00c4ad0926

          SHA1

          230c6aed96e8254648f0b97df339675f14ebf9f2

          SHA256

          1593f3140e077bb7dff1e4e5313361996a8a0005f382e1dc8bac7f111d9c50ca

          SHA512

          db5961aacdbf81ee10514cd70b9f8652ee0b6532a60e37617aeede358a0680262fdb0f6b09775c24225458b9c095737daa464a92d31942a8b320156551b4aa6a

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          103KB

          MD5

          382038e67acac2f48a6135997f22535f

          SHA1

          0c455322f5c4c480c807d8a30bf74928c11b69e5

          SHA256

          27873a7b77c29ae7744776aa3e05816bcb2cd47981313ff428f1a5a4c3144bc0

          SHA512

          fa8cbdd98a46a85d4746be99a0c7767e5cf614f62738dc3461bc9ce611a6b219de70ebbc996ba1bd09992e85515ed3a5a9fe6d583dbfa0f88d2974ebfe166421