Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    18-09-2024 08:54

General

  • Target

    50829aa4cf9fda67c935626cec789731affce1aed5cbd31d836fc58673f73638N.exe

  • Size

    40KB

  • MD5

    26b69eb1ffae3398bffd6c474ef01350

  • SHA1

    ee7345b42349ca7d1dc49d8529c94d1480d2296e

  • SHA256

    50829aa4cf9fda67c935626cec789731affce1aed5cbd31d836fc58673f73638

  • SHA512

    460633abf960b0e76e8b1e8d997956201398314cf8663ba474cc1069ccc578ff794b140681489fc1794f856d6bdec9af64ff5e415ffb1d4afb5470c3a85efb9e

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfproFNFjqAJLOqAJLL:W7ZppApBULcfpHLcfpyDQ

Score
9/10

Malware Config

Signatures

  • Renames multiple (3277) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\50829aa4cf9fda67c935626cec789731affce1aed5cbd31d836fc58673f73638N.exe
    "C:\Users\Admin\AppData\Local\Temp\50829aa4cf9fda67c935626cec789731affce1aed5cbd31d836fc58673f73638N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    40KB

    MD5

    7025a2b2a92a6fe47d44ea2056868910

    SHA1

    37eb21c997cd1e6e4deea389fbdf6d7b9d60ca70

    SHA256

    cd822cb6809092a89def9bcde7e04f988c4938f92f182e527e6a4d793681aa3f

    SHA512

    60b4234a7a399344c3f620e59db3e74cd8e6fde9999a1b3eb6d1242f1509d15f7c74b406d67bfd75339bc0683648e74f275c62e7c7c572625d2bd75a2e13b6b5

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    49KB

    MD5

    fd2aba8042f6fbf4858f4141ce0cbdaa

    SHA1

    824afebc3ff45a98ed0c58b1f0204dcafb7b70dd

    SHA256

    e65669e67401e7604bd81705f5ed37b557593d3947a35a3fdba8c6c3816b8c6d

    SHA512

    eb255688fe84d5819778c9aeabe4f0ebe64bc3563a70e949143e6a935c19307beb37e59d05b149466223070338d7f5650ab96759ccc78dbbc7385ea6892f83a5