Analysis

  • max time kernel
    119s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-09-2024 04:49

General

  • Target

    06dcc7876979185fdea540dd95093d00N.exe

  • Size

    46KB

  • MD5

    06dcc7876979185fdea540dd95093d00

  • SHA1

    5c77b789f6d1a36382f5bf37c552fc1c0f01df5b

  • SHA256

    3bc2e78887502ff88ff083e160debfbe2f6935c9cb3a000088d815f75c807c24

  • SHA512

    7bcb406f10c9ba2943a0dd7cd625aeb951eba30e80f136154b9ae6eb8bb73686fc311114e1dd224e307e50ca65fb4992a58a1034f1eb33dcba83d425db4330f6

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LObC8p8bvM:W7ZhA7pApM21LOA1LOX

Score
9/10

Malware Config

Signatures

  • Renames multiple (3249) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\06dcc7876979185fdea540dd95093d00N.exe
    "C:\Users\Admin\AppData\Local\Temp\06dcc7876979185fdea540dd95093d00N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3063565911-2056067323-3330884624-1000\desktop.ini.tmp

    Filesize

    46KB

    MD5

    740c04c254bc42b0587c587f7971a0ec

    SHA1

    39d69268f172376e737665245ab9a29fe064cf64

    SHA256

    417a7294f03e51b6be0d331d9cfb391b39630d908d746bc778565be4ef176480

    SHA512

    cbf393ef541e535f041858d7b068d2ae32f4ff5f256cd8bf33c784980e1e0eac0ad49e0c1657e2e2b29101df1de3bfccc4605f94ecaed77514b64145360913ad

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    55KB

    MD5

    2ebffbcbba30915f0fb5fbc525112667

    SHA1

    5365ffb7487c78b42ee713c7a572b44fdb862950

    SHA256

    15e619c635d9ba56b9a6a002027020047e1fa0a48dc5f51d4660c594e0127126

    SHA512

    0bbe88a936e012f2b1d2bc49fcb9ccfbc3a04c071e8465dad08a214484f7634b0cb7d41e6446961c6e5401f6950c439ce686d549e90fefce30661ffbd4ca6d47