Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 23:13

General

  • Target

    393e173077981d7630051ce844119720N.exe

  • Size

    128KB

  • MD5

    393e173077981d7630051ce844119720

  • SHA1

    3f447876c7828db3c77b05d5b032374e9a5a207f

  • SHA256

    6be079842c4d98182f245f4ac6844b620902fd5288d4548e3d17290aaa3fd818

  • SHA512

    b492d6d8cb1be1361506fd1ab89c47cc1cfcdef926c7b49948a22abdb543d40efd2e87ba13626d77058eb17ed9159dd176b1d3a2cbe243ba565d9f48d35d5306

  • SSDEEP

    3072:6e7WpHIyRF9ESWu0SWujKsKRsP9fVL9ilCvLYCCk:RqlIyFESWu0SWu86jYlktz

Score
9/10

Malware Config

Signatures

  • Renames multiple (2827) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\393e173077981d7630051ce844119720N.exe
    "C:\Users\Admin\AppData\Local\Temp\393e173077981d7630051ce844119720N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1232

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

          Filesize

          129KB

          MD5

          3088fb593d0716a83693468a5029e212

          SHA1

          0287f1ca01d662520defab0a61a74f130d0dc93b

          SHA256

          ba8f8993fd00d0b9f6025e494aba07a788f5149cbdb3313e3eada380e5cda67d

          SHA512

          5aa21c4d699cea1f132a7b3bba9ece00b55a6aea8d90de3a463421946122e812f533e5acf0167746757257b11b1c99df4b28826b9c952e63408858cd4bc550bb

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          137KB

          MD5

          973d94e399411cc70b71b5f46ec2e893

          SHA1

          9938a6c72dde123254d392babafb4ba9e4c6f516

          SHA256

          4739e09188bea0a3fd6d0f8d14e2137736757e994f346aee6b5e11dfdb4d6d52

          SHA512

          1fc98aeaa3b5669657a729e0331a0cf9c65dcec99f533ae7863ec6d165d143133a31c688d703fdf502259278a2295dd859acc05878fe093d3ce0dc877fee421e