Analysis

  • max time kernel
    120s
  • max time network
    21s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    02/09/2024, 02:28

General

  • Target

    864afe9b8a4de65de0f58ed8e699f910N.exe

  • Size

    128KB

  • MD5

    864afe9b8a4de65de0f58ed8e699f910

  • SHA1

    c150d2b7210489396e100e9abfeba4f5b4b21466

  • SHA256

    ccf7a440c0e713b114a678e566d789f569726a7e370467c13eb8dcf2a6fb6172

  • SHA512

    4d70a1c54af1d1f7bde62598c1cd4ff23e39a0abc90607c1d0c5bdf39b0405d1a955d73e6ec0a984aecc956ce93ab35118d0f4a2911a2dfa89b7296c5e76bd58

  • SSDEEP

    3072:6e7WpHIyRF9ESWu0SWujKsKdlblbPxBR78qMD2+jaj86LuhmsMat91:RqlIyFESWu0SWuAPx2ajODD

Score
9/10

Malware Config

Signatures

  • Renames multiple (2824) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\864afe9b8a4de65de0f58ed8e699f910N.exe
    "C:\Users\Admin\AppData\Local\Temp\864afe9b8a4de65de0f58ed8e699f910N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2116

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    128KB

    MD5

    d78cf85e170eaa66d9df0024c7efbde5

    SHA1

    14f444fb81f6d2ca862ff51328e8cdd0f021599f

    SHA256

    e0ce7675b92c2ef6c1b0cdd27edec8a0c9baca99beb06c1dc43ea9ee50f446aa

    SHA512

    ee413fc0dc2de113df02ddbb43d3abf631839082857d40c907d9b0f31e7f8d35b9a42c1b8ebad4406ec37a9cc098755f61c2730451c27655b478519c4aeb08ed

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    137KB

    MD5

    46de4913395b20b694fcdeac94acb6b7

    SHA1

    c8bd4885d935ddda9ac00707332d5b4417a3e8e3

    SHA256

    d60d72f8f1fa3f85f7526c9489ce953e1de7042ecaa7ac7cc1e5c75440b3211b

    SHA512

    791e63366ca0359d51f2c759be9094319b293b3e74f41b5c0aff0b039a8b158966fe7baf6279a0beed0ba17109230b6de4ce3c9fe46c0a68f5013d91851c200c