Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/09/2024, 13:20

General

  • Target

    819e9e4e81350b5b132e5c9b1cfa0a30N.exe

  • Size

    42KB

  • MD5

    819e9e4e81350b5b132e5c9b1cfa0a30

  • SHA1

    1dbf602e4b14f2f1ca776c83713ec2fa2bed6ac7

  • SHA256

    d3c0f62e0ffabc7a235752706174434bc508613782350a3897ffa7c9b2f30a58

  • SHA512

    4b102db922f727933874379c1d59a00586bd328a9622c618870c2f875511e726e413bdcbec3eda9e3f46362a8161e55489ed89119ef86ddd3f47d334834c92c3

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfpAfxRfxuKVKgKVKJ:W7ZppApBULcfpHLcfpAfxRfxuw1wa

Score
9/10

Malware Config

Signatures

  • Renames multiple (3409) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\819e9e4e81350b5b132e5c9b1cfa0a30N.exe
    "C:\Users\Admin\AppData\Local\Temp\819e9e4e81350b5b132e5c9b1cfa0a30N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2872745919-2748461613-2989606286-1000\desktop.ini.tmp

    Filesize

    42KB

    MD5

    e9f195835e7186125aa3f1e2bf4a4b89

    SHA1

    ffc25501184b6cd150ae1a9648857c53f40f90c1

    SHA256

    68bcacafff532c6af29c7fc80a1bfd780c58084f881f2f0cb665cb31c072c166

    SHA512

    f769b462419086a4987fcda8563a3146f4b29caa533af5c5801e2a8172ce1ab9c70f4e27d53ffb1c3dcffabd6d70358a81033497b6159b44c5deb3a4f0027276

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    51KB

    MD5

    cfaa15091d74d8783d2167e10029b8ec

    SHA1

    25f6c207ae63d0d277a4ae18eafd5042da0e56d9

    SHA256

    c76fb15caa66c626260eb416e9efef5575b5fda2efe6acdf662bf733001d4d58

    SHA512

    32a85c93a77ef3e0fa1c6a3725a7a351f5729a0567be4479f5c3be55e5f6845f00584a92b51606e697413230f752aa4e79c67060bb373659fef97b43e56f3525