Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    28-08-2024 23:36

General

  • Target

    d966f14129e0fbc1c8dfa3a0e038af20N.exe

  • Size

    45KB

  • MD5

    d966f14129e0fbc1c8dfa3a0e038af20

  • SHA1

    e62a8626b343a32847ddb540bf207479de3e5ebe

  • SHA256

    3db96f7bfb8e5e8ba7d02fd07d461ff97c6a6a39184c1e0724eacac761a5b214

  • SHA512

    1dbb25b916dd98ba08dc1b1db5e7a01b3998a9d6a35390247681966a6150d91016452350966b9f5a788927cc51b3b009fbe1ca39acede7483550717f70ad7bb3

  • SSDEEP

    768:W7BlphA7pARFbhL801VvM801Vvv7cYTfZfr:W7ZhA7pApw03vR03v4Yl

Score
9/10

Malware Config

Signatures

  • Renames multiple (3256) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d966f14129e0fbc1c8dfa3a0e038af20N.exe
    "C:\Users\Admin\AppData\Local\Temp\d966f14129e0fbc1c8dfa3a0e038af20N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2352

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini.tmp

    Filesize

    46KB

    MD5

    7169e101d49c691b9f92a52393be2168

    SHA1

    c1bf622df0a247d92f0e96ff90bd200fe8dbdf15

    SHA256

    f66b5be2429f22263725ec8606620e70a057d57b6cf382773c2b0781eb823333

    SHA512

    4494637452302afc1ada3a64ff0bd17f6a9187a36127c6de64880978084ac69a814a400dc692a24732c28f68b49fb3c994c939dac1925e6f822d21e37d8ba603

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    55KB

    MD5

    b23feea336935b3d431c749bee951393

    SHA1

    c117e925d5799964a54dee88bb05fa0c3c07d797

    SHA256

    3170ca5e7b3d71c8e5a03be40101a6ee894037763e1ccdde0e02dc2e7b15f524

    SHA512

    cd7ff5bd4e052cbd1e0e736b569881beaada031154ec27f7455d385e56058e89dd9b277ba741191fc200b93538f8ca37eaafeafeaf58d8c224e4125e46ec9da0