Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19-08-2024 11:39

General

  • Target

    9abd029deded6dc4c024ab82ba25b000N.exe

  • Size

    56KB

  • MD5

    9abd029deded6dc4c024ab82ba25b000

  • SHA1

    f1cc6fd748fd77d13dafc4e19c5f2766c668fa88

  • SHA256

    f5d4fddb93bc5e5944b963a3e2c23e58482cb0c139227f24fef8fb7a2f7a75dd

  • SHA512

    cf9fefc3431f5f86bf0f35c24f2c6a4f2e4890e5ca1fe10d33732c72b1d0da8acea88b2103c301f6a5ea853cb3a2148dac3d4bdc16e412ccea07295ce92a2883

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfpVF/MF/3Nw/Nwk0cEMdV8IEMdV85/FoL:W7ZppApBULcfpHLcfpX2/Nw/Nwmxf

Score
9/10

Malware Config

Signatures

  • Renames multiple (3174) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9abd029deded6dc4c024ab82ba25b000N.exe
    "C:\Users\Admin\AppData\Local\Temp\9abd029deded6dc4c024ab82ba25b000N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    56KB

    MD5

    871d82ae348ca2ded62f50a789566977

    SHA1

    7e4c8fb63469c56ccb9b0cc40bc5c487f3919ad3

    SHA256

    176f3175f3899448870cb45b950a19dfa2f5ed00c375d6af46efc44ae7c12042

    SHA512

    39b61b19014870c93c5ff3aba9550be7074812fed007d5005e0ac7994accf3ed9e2ac12b3d8c00599da149c6dfd6961dc8123692e768497faa560d9522346a17

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    65KB

    MD5

    84e31f8796811a70ba2f192b699d55f0

    SHA1

    d46540f440bdf681dcb6ad5afe2829974eee513f

    SHA256

    ee6bf25d870aaf21e96da69d657e068378bf2be85c12e7a0ec7d8fd54d8e4309

    SHA512

    dba14ea49e2b069901a996bdb6b239dcd296458d2b175041dc6c8f5dd5bf5a9d4b5d201e4c0c8663f303aebd8c09ab139fe9b562e89a8fcd5f327a0ffd056610