Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    05/08/2024, 08:30

General

  • Target

    6e32943f366ab2685a33c83787075670N.exe

  • Size

    38KB

  • MD5

    6e32943f366ab2685a33c83787075670

  • SHA1

    f1f9e1d205c31558c5470a71ee0dc830e7be916a

  • SHA256

    c073de727a89287cf50abb126bfe9dd3cdf7fa540635111f6945bdbb55c69149

  • SHA512

    38581bfb338dc51ae485d691b5ed90ab6ba82323e410e8b8da4d19afba2396589a34b87624eb10cc0486083df2ddfc5ac60feeb120f82c0323bcf16f45046e12

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfproFNFjqAJLOqAJLUtO:W7ZppApBULcfpHLcfpyD3tO

Score
9/10

Malware Config

Signatures

  • Renames multiple (3343) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e32943f366ab2685a33c83787075670N.exe
    "C:\Users\Admin\AppData\Local\Temp\6e32943f366ab2685a33c83787075670N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2000

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2257386474-3982792636-3902186748-1000\desktop.ini.tmp

          Filesize

          39KB

          MD5

          2d11a974c62d3fc6c16d67495271b37f

          SHA1

          d118850a3ac9e5ba8f7275b989190b61c72177ee

          SHA256

          daedd36174e854a4be3b7f80d63632e8079fdee102353538a83c359ac4d7a215

          SHA512

          a1f37e6e40e4d4e6179322331e97394507178594e31d262cd2652f8e0b084c8239333c428c829a34cc0a3fb0f159aac10355c986f209949ed64747dfa639a4ca

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          48KB

          MD5

          8259b418cef5f9862d88b092c510579e

          SHA1

          4c8135ba23724175532007bb50e8ba135ce44120

          SHA256

          6fcf1f28fb053e1c5e10a915a5175aad974f79a403202b27b62ce73029edc7e7

          SHA512

          e3e1b86a09a0fe158d64ea754ea01dc9c1ac960d3ec5ae8697b7593dc2d3ecffe32f79869d6047ba663b009dde3167e6dd95521e3fd59411d30afdaeb4c5e42b