Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/09/2024, 01:38

General

  • Target

    6a9195fa45450602e989ca4a68f3def0N.exe

  • Size

    84KB

  • MD5

    6a9195fa45450602e989ca4a68f3def0

  • SHA1

    716b6808592bff8ef01f0672f63b5758e99297d1

  • SHA256

    2daf25388f33d633678bbdeb0f33e64cce010bc6b92021b4945e53cb1a9edd90

  • SHA512

    2cfaaaa599e29c4c8bb950c69c03e43f611fe7afacc4943294cfcd8ac4808693bea844a6d4d38f12d5ce01cf7ff1365e57ad6c5f48462d7c6ea8e10acbc9dc20

  • SSDEEP

    1536:W7ZDpApYbWjIoPyPoLzV7c6ShZQ4PN54PNr0Vs:6DWp4Wb

Score
9/10

Malware Config

Signatures

  • Renames multiple (3143) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a9195fa45450602e989ca4a68f3def0N.exe
    "C:\Users\Admin\AppData\Local\Temp\6a9195fa45450602e989ca4a68f3def0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2872745919-2748461613-2989606286-1000\desktop.ini.tmp

    Filesize

    84KB

    MD5

    87fba7bc36eb8a09acc2c4a77df25233

    SHA1

    fb1b94c79e7d0725aaf0fe43916624346250ef04

    SHA256

    98d39b49894a7441f34b676a65e3c070426b24c953fbae11c8d2066e35116f2c

    SHA512

    ed1e0eccfd11ab31d2f15ff3ed2f86ca76b509c626ea8d84d64377c4002aee255d37ba1bb141ab17ab76e68c7a25a520f716b68d63c2ab04978513f958a3d2d8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    93KB

    MD5

    5f20e4d9bc337fb4c53d22552a5f41ca

    SHA1

    e63d1b6732d1abfb0c61fda438a1441aff0a7e63

    SHA256

    ae2608afd98dceeb8d77bf01ad1438802c2aedeff147b4600ae48a6fa63eb27b

    SHA512

    609bdfca6bed06dfae8bc7db4f5a76493dc1fea4d31fa806539c5e379b7a9f9c112d8a43c6461df25bbbbf8b85a17ca386f01c039cdac4ac4f3190bb81e484c4