Analysis

  • max time kernel
    120s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    15/09/2024, 11:13

General

  • Target

    a59727ca9b620cae5cf9c876eb475670N.exe

  • Size

    49KB

  • MD5

    a59727ca9b620cae5cf9c876eb475670

  • SHA1

    a8dbdc0b7f5f2cfaee098ba4f89a796b25030629

  • SHA256

    5c8d0855bd327c48d02cedae2118b809e19134430f8a843588f70c7cfc6c06e2

  • SHA512

    ce44b3a7190624e00b69113caed5153689fccc250335fa75f7939281d2abb35699e134a0e219488a5809c75a74997359954c36b23647570528bafb3caa357366

  • SSDEEP

    768:/7BlpQpARFbhn54fmiy+3BVr54fmiy+3BV6nhSn:/7ZQpApmi6nhSn

Score
9/10

Malware Config

Signatures

  • Renames multiple (3224) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a59727ca9b620cae5cf9c876eb475670N.exe
    "C:\Users\Admin\AppData\Local\Temp\a59727ca9b620cae5cf9c876eb475670N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2536

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

          Filesize

          50KB

          MD5

          3348fa8ec4801776e3f38934e79c3fa6

          SHA1

          95e41adb59c30377179b1c8d4a1b38caf94134a2

          SHA256

          1eb8bf4e8341e67781a23e556af3b97dedf42fcd0170789784f988cebcc4ea9a

          SHA512

          89cb40f8fd11888ad8473447f229e3bc75388d839e589185a5f41a029ac8a33540eb9fc3b78cad2b41b081bd014772133e4badffee35e54d1011c8ada4b092f0

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          58KB

          MD5

          89820e288b192da9b879b9f8dd3d7ab0

          SHA1

          4705203bc26ce347f5d32667cbb69af7e548f6e4

          SHA256

          b79f196b3cacbffb8f2120d2cbfac3f000110c485d641f406c7c24dc225e79eb

          SHA512

          65280a9ec120a21fcb0bca83a121fbe559d6a4c29da8bbca0c2c291fe81cea6788bda488526923bd3030c0d998730fb23c3cd63a773ae0953fa1ac7765b82b89

        • memory/2536-0-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/2536-70-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB