Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/09/2024, 02:55

General

  • Target

    39946a4e1735910e7be9cf80a856ec90N.exe

  • Size

    82KB

  • MD5

    39946a4e1735910e7be9cf80a856ec90

  • SHA1

    984d1a5cb09bd69dfdd8e15baffd1471572e4cc8

  • SHA256

    0404e02c6c84d0982f7a11b2fb3c2637351407078e5bd1d2fd4184254ec53dd0

  • SHA512

    88e6c4018eb71df0236cce1298e8b94dbb2bcc9446e3ec5c308f937262a171b113eee0b051d180f62e26be3ae42d8747cfd9172644661afdafb826352c182208

  • SSDEEP

    384:yBs7Br5xjL8AgA71FbhvJUfWGUfHjtmjtd5NaMR5NaBQNNmPx/Pxx:/7BlpQpARFbhiWb8naOnaBGNS1T

Score
9/10

Malware Config

Signatures

  • Renames multiple (3080) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\39946a4e1735910e7be9cf80a856ec90N.exe
    "C:\Users\Admin\AppData\Local\Temp\39946a4e1735910e7be9cf80a856ec90N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2148

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-4177215427-74451935-3209572229-1000\desktop.ini.tmp

          Filesize

          82KB

          MD5

          df05508c6775035170f17d9d830bb9e1

          SHA1

          5249253d50db5863e53e4d1f1cb08b7dd0167aa1

          SHA256

          f2bb6e69a048c81aa365911586edf55ee83471779bacfdc171498a750ce78a89

          SHA512

          ccb5eb179070baf69991e18add5854eb04981af502cf8ad3f96a4a9ccc3091bb167402fb0b364da086c4b33395a8771a92707d4bdf4936c75b675b46b2f50ff7

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          91KB

          MD5

          f76c598a5fe112007e5b8e624f7782af

          SHA1

          f294900de17ab5ea8494e2c60bf8ddb9db7b2a00

          SHA256

          7892e022e148daff92dc30bfcbde8a916b3a21c7f44ad7e1ee3b5b25f7a1b765

          SHA512

          81d4a7639503c2f675a1dbe87762e47bf19f5cd918c1a62fbe7c36c5605c75644304ab5ecb290f35cfcfa7744bd9ec46a0f2cb295ee58c1ea7cdec80d0e1b641

        • memory/2148-0-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/2148-74-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB