Analysis

  • max time kernel
    150s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 15:35

General

  • Target

    17475424215874c8f3d30c17db87d670N.exe

  • Size

    84KB

  • MD5

    17475424215874c8f3d30c17db87d670

  • SHA1

    d4f980bdc9a5130d04a435b7d724550f195d70a8

  • SHA256

    7490a9e935411ecbfa869887c6f9ee54e17262d76250a45e0e52a6152057551c

  • SHA512

    f352a4690ff6e62c039915d94e95f502f7e2ba973a44d3d05109d24a453d23f2452913a13398ca720d9e8aeb652f4064bfa07cc65dad26e648dfffc9024fc54a

  • SSDEEP

    1536:W7ZhA7pApMaxB4b0CYJ97lEVqNR7Yge+eTdsdTTXTbr2:6e7WpMaxeb0CYJ97lEYNR73e+ear2

Score
9/10

Malware Config

Signatures

  • Renames multiple (818) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\17475424215874c8f3d30c17db87d670N.exe
    "C:\Users\Admin\AppData\Local\Temp\17475424215874c8f3d30c17db87d670N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2364

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini.tmp

          Filesize

          85KB

          MD5

          2d0c716fdcec119f8a1e716aff5aef76

          SHA1

          7f1eb231948f1341b65cfa205b5f1c2619429f30

          SHA256

          4528105ed5c7390e6f62298cea071d9ed3e713fad29fec1a6b9c2283b2898dd0

          SHA512

          fe85428928467e26225f1fc2737fda9db313a01488b339bb664a5972bdf17eefe0dd0e4cf02168588be96efc11f48be2b5f7c86568c2eb59150d23673c20f3c2

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          94KB

          MD5

          9e0e7d07178a3e66cbf5058303339c9b

          SHA1

          4db94f38889a0affa0a95cdc312d6ff978edb3e9

          SHA256

          4498ff403a198393fadb4abed2f519c493a9b5e69dccb59afe272ba66ab723d5

          SHA512

          cb0f200af73311e05a8b899ea4e18f59eaa5af5a8e3866b00a7bf3fe11ebd32e405a0ac4f4a026623db1f542c82b8e67081ec0b076797f2586c87bcffca989c3