Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    14/09/2024, 20:18

General

  • Target

    73bc52198458cdefb3445ae57fd53cb0N.exe

  • Size

    91KB

  • MD5

    73bc52198458cdefb3445ae57fd53cb0

  • SHA1

    e1bf262c253ce83884848fd3c7f8e5c7c8f0faee

  • SHA256

    74be99b2fb3b6856cd856c8bcd2d2bc6643cc008cd9f935af4dfc38929f6517b

  • SHA512

    f90ba301650e0e39eae09777845e3442adb02356292ee6ba34329357793b4c03f52b6b6736b15676683f82c96c67e792aa5bfba3e35c7488b0abea2c8144d7a1

  • SSDEEP

    1536:W7ZhA7pApH9QHwtRF9ESWu0SWutlggalggyaRjvmujvmRzqzlmJgwmJg/Svqv:6e7WpHIyRF9ESWu0SWuDm841qL

Score
9/10

Malware Config

Signatures

  • Renames multiple (3172) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\73bc52198458cdefb3445ae57fd53cb0N.exe
    "C:\Users\Admin\AppData\Local\Temp\73bc52198458cdefb3445ae57fd53cb0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2380

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    91KB

    MD5

    35d57b023cd136606fcbb3882a383921

    SHA1

    7b6eff2a7c3745fb9d157cb72fb6627d4be7ac6d

    SHA256

    9264755b6f4a7894b19027b3a150b3ea5a329015ab7d745d73a57952716dfaa4

    SHA512

    4328d174f3cb97664cc5f9ed0a6b97cf9ad137c1e82817266393b752a4c5f8baae94616b953e26ae11aef6540775f4920f9c05dbb5fa46985fe26b9d87c086da

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    100KB

    MD5

    7285a89239ae789f9e6259ca57bac1cd

    SHA1

    dc7efbc32a1698f36cf65987558df443f89f4607

    SHA256

    48727338fe9824f4e3999af4d022f69e36269287f813f17ffe2586bd5f6221f8

    SHA512

    35761f337fd6f1187de813975ffe1dd1bb593d70162c89cebaacb82b2dd48c54d2019cdadb59201ad169685487adf455d9b45b5bf591a22ace2c12969e947e3b