Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09/09/2024, 18:23

General

  • Target

    28a0c413f453d2822314714e935c1f80N.exe

  • Size

    44KB

  • MD5

    28a0c413f453d2822314714e935c1f80

  • SHA1

    cb7d25dcddaf9e58debf093b308e03e78dc222ac

  • SHA256

    64c0acf76c6e9aebfffcb239b894e5002642576b2b59d5ad785b6a19440b5fed

  • SHA512

    25a77855c9ae66467f764a39c5382d58d2c6d43efa266eb081d95c8cb097db38ccff7526443d150b321cde3b597bec9ae3034e33f457462e74ff1e0a1dc574c5

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfproFNFjqAJLOqAJLr3jxOxw:W7ZppApBULcfpHLcfpyDMxOxw

Score
9/10

Malware Config

Signatures

  • Renames multiple (3181) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\28a0c413f453d2822314714e935c1f80N.exe
    "C:\Users\Admin\AppData\Local\Temp\28a0c413f453d2822314714e935c1f80N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    44KB

    MD5

    ea981151774626bc6c43c3aa4b51baab

    SHA1

    47722baac40ab388aad6855ac68fc82bf83a8cda

    SHA256

    d7e1f68b2d02a0fc3e076e792b211fc771f1a81fed75266845b34476a5434af5

    SHA512

    fd44156a419e74fb47f4c34afdad90f8e578c1ed61ee39e9dbf7703abfd94b52611f437efaa17ea7a9f68334887b56efdbad718994f7feb713ed0df63925bc3e

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    53KB

    MD5

    8c05c6d1bdb4f2b07f1abb1fe48a0940

    SHA1

    419548547c01a49415d2654cf4f4d9f7b73be8df

    SHA256

    0b592a7b95810bd437f975d9ab88f5df8ea78aa091b3568b0894da5f60888801

    SHA512

    97164610c6792790fb5da5b037ce591c66472bb70a0c300ff0cd31f95238d2eeb8e9bc97176dbc5e6e677a9912cf863cc69ec075d0ccd62b977cc8faa3292a38