Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    28/08/2024, 23:45

General

  • Target

    f0907e9e921d21614a267cfe250b0290N.exe

  • Size

    51KB

  • MD5

    f0907e9e921d21614a267cfe250b0290

  • SHA1

    e98b831345911235a77221975353a71aee80e2bd

  • SHA256

    4a23a47a752a81cfee8d291b245a94a515df4189adb65af0ca435e2b1e7e4360

  • SHA512

    5081b5533aeed0d2efc878fd1890ad9aacdd8304bbff1277933d2c1a453d6de82293049dd7aefa356fbd3e424035ab085d69b51103764dc5bb7809e167be552a

  • SSDEEP

    768:W7BlpppARFbhHFoqAJwBqAJw1VyjVy/VeSv101k:W7ZppApyVyjVy/ESh

Score
9/10

Malware Config

Signatures

  • Renames multiple (3280) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f0907e9e921d21614a267cfe250b0290N.exe
    "C:\Users\Admin\AppData\Local\Temp\f0907e9e921d21614a267cfe250b0290N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2392

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini.tmp

          Filesize

          51KB

          MD5

          95706c2252b612568089c20871df894b

          SHA1

          3a97739ff17068ece3eb53723d07179d89d704a1

          SHA256

          0ff94d2e77c1f2e2d2bd34fe5845bea171ae064171190b9f9f9dcb638fdae9d3

          SHA512

          b85fb334618ff71b9d6c4cee81c0d83a17956b37b4b517c49faad5c838b620881afa30055842ffee51de420e471794ff333f85f9f94089c5a21ff33a4f2f13f8

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          60KB

          MD5

          252f7f225e00c4853d1f6977b3f25ecd

          SHA1

          f2c69cdcfd007f99c1be03f121dea0cafef8fa8a

          SHA256

          ac24267b220e8c5213dcc5054cb932c4dcb23945fb9c8da55dccac41cab0bd86

          SHA512

          d1248695eb8454d531d649ff54a6c562067d3f23db6f3c1433db27cd017ac44bfaf58891be87e48fbdd21fd0dc0592b4ed7807b95acbdf477309df66402318cc