Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    21-08-2024 15:13

General

  • Target

    6d05038dfeaf2810458845c011c99200N.exe

  • Size

    195KB

  • MD5

    6d05038dfeaf2810458845c011c99200

  • SHA1

    5270cbf231fe44666787cef0aa5c5aadcbf59eac

  • SHA256

    3941b8822b8b4ae26537dbaf5805c731287c0ad5a69b5fc2c45f7c717da66feb

  • SHA512

    314a7af33c870c8879b6512d7d27392656eee564fe56bf79c509c30c24e1117ebed018295e515541bea63e8d79b198a51f3e2791bbb101c046359c962b0811d7

  • SSDEEP

    3072:6e7WpMNca3rytOkWpXfnYRl2l/9HSFHzJ0lBJTzkZ:RqKB+tOkWKR0iJ0lTzkZ

Score
9/10

Malware Config

Signatures

  • Renames multiple (2661) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d05038dfeaf2810458845c011c99200N.exe
    "C:\Users\Admin\AppData\Local\Temp\6d05038dfeaf2810458845c011c99200N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2500

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1385883288-3042840365-2734249351-1000\desktop.ini.tmp

    Filesize

    195KB

    MD5

    f01acab37f9d938ba735fb935b2cf4fe

    SHA1

    715b23ab177f988a1cbb96d9fa2c50bec7006f30

    SHA256

    9159e6d74469b1446bfb0ec00b0ffa040aece6750a9959a6e09d819588e676b1

    SHA512

    922ed145e9f810ee1a55d3352f7b347697f4d244ae9d463790a6d86790a676b986dcdb6695e249472ba7f475b85663504d51acc8208f7f72d169fa44295afa9e

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    204KB

    MD5

    5b1b212fe927b9bc0677d53635c646bb

    SHA1

    805879e891a833598b846281af4e9dd01833dc45

    SHA256

    b6afef4587d817e8829f54a0f164307a208d8c6fa8eb14ecf31d12e4736aa9b8

    SHA512

    5365796b0e8e1939e181313b2b746be741841d9ee462d0389e81db16e22c5e070a0cfc8b4a8fc3807a8953329f3fda3fe6f67d45d8c2be8e2aff9db64548bbfb