Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    03/09/2024, 00:35

General

  • Target

    6e28290f926d64481cfa62ded5aff5e0N.exe

  • Size

    81KB

  • MD5

    6e28290f926d64481cfa62ded5aff5e0

  • SHA1

    f84bfaaf09b0fce6bc5463af974e6d396ff38522

  • SHA256

    29432bf5c8ea010013ef9e8a829d5cbd5b8643b26a5aae79f54a95a05d3a41c2

  • SHA512

    c4a0e32b5d76e7873de47a57849a165eb52991e901ba98af53238e61c8181a95eb91f36c05e401c0f2f542e71e0f5aec7a5db18b1487d7b9ab84b33fa6216acb

  • SSDEEP

    768:W7BlpDpARFbhYQkQzaxkd+axkdo176/hvYaJaMGw4PCs2B24PCs2BHE4JAIAepEi:W7ZDpApYbVK4vx4PN54PN4OHepOHeZSa

Score
9/10

Malware Config

Signatures

  • Renames multiple (3125) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e28290f926d64481cfa62ded5aff5e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\6e28290f926d64481cfa62ded5aff5e0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2536

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3502430532-24693940-2469786940-1000\desktop.ini.tmp

          Filesize

          81KB

          MD5

          abf75cfd8524367f5e45fb1a57ffc504

          SHA1

          ca0252353251391cf24a9e36d2bccfc73b30fabf

          SHA256

          f136802a8fb2189b6ced5c300e6ab2942fbfc9d45f015f3d6e65faeaf170be46

          SHA512

          423ab973c6bb7ad225a880db5c11cbdeeed4888e83f060ff11695b1a8ddd38b8a14dd0091678b9e44231904330456aa522695499582f8afd1f3beaac41fccbbe

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          90KB

          MD5

          c8b7d91d5dc94a06e1140fe5aa308149

          SHA1

          ccecef6c45513eea8ebafab028ee76c3cf2802dd

          SHA256

          26fca15b671b6211661ec97952953b0e8aa542894e0080048183fee6dc584627

          SHA512

          a8a1e3f9bc7a5955b747e338fa44b357deeb1444757394975f6756b02d724fddb2a5fa06d821545b09551aba4495bb938bdc73c84650ea51c4f19bfc20aa1f88