Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21-08-2024 17:32

General

  • Target

    99168f0a5be4accdb8c6cb07b24376c0N.exe

  • Size

    48KB

  • MD5

    99168f0a5be4accdb8c6cb07b24376c0

  • SHA1

    1caeb3a88f9017905ce51b02f4389becc2e29ec5

  • SHA256

    030b0c911585e6d24d480c817f34fd9e157146a89607710762f15d62380d9099

  • SHA512

    c1d39001d9c74e2f8f6bb52ca6f5ceffdea5b769088c35f6093de3abc6baa77b8a5c2bb71d2d39acf8edb5d96bccf97c50304848ef3317b0a39d7b1397ec88a1

  • SSDEEP

    384:yBs7Br5xjL8AgA71Fbhv/Fzzwz72Jwuq2JwuR0U0Iqja9jaJS/A/A:/7BlpQpARFbhNIiJwsJwwnZ+S/A/A

Score
9/10

Malware Config

Signatures

  • Renames multiple (3250) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\99168f0a5be4accdb8c6cb07b24376c0N.exe
    "C:\Users\Admin\AppData\Local\Temp\99168f0a5be4accdb8c6cb07b24376c0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2252

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    48KB

    MD5

    f4a2587892a9e6f1fb6d83c35cbfbfb2

    SHA1

    66bd7340783f9ba7acf2d298bd5142ed10d4f77c

    SHA256

    31ac53a97ce822a54e5d94d89d9953c9f879bcd4b45578ddabc6ea26d243dbd4

    SHA512

    0c3751add0f86599d835bc3cf333b420851c254ff0932c09a66901d9d12e3e10c52c4d01dad97968d1e56f5d29d4893c39871feb3ae6ac556527d9289a09bf4d

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    57KB

    MD5

    2f43fc028dbdd681f9dba4219be29391

    SHA1

    5425860f7a2be6872a7ba6911fb80e5749b06479

    SHA256

    3e8616d15e9d35e0e1902c26bec2c901d5acfc08ea8a4d4086d064cb4add7453

    SHA512

    b533728f7bd463bda7dca9346329e633ee3619c4cad260a19fd67596c66052bdc2bc6b5b4f3a677a1b2246e8dbe938db43aa6da90c6c7018f05171da8cfa1d26

  • memory/2252-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2252-74-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB