Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    14/09/2024, 06:24

General

  • Target

    299251bc9442da32799c3c9fb9d3d770N.exe

  • Size

    57KB

  • MD5

    299251bc9442da32799c3c9fb9d3d770

  • SHA1

    f127dbc04f881960c1e5a697b61c1128333e3e78

  • SHA256

    f81638efb31c8fb54afe7320df67683a5f31942cc7f75e56abda46e9697cad2e

  • SHA512

    1a4f4c4e437497f5c0ef92af659443d18e69023e628ffb04da156522b6f55fd74a83d8d746dcaa8d18c09e290e5a282755b7d787b39e6f05485720e727b91f6e

  • SSDEEP

    768:W7BlpppARFbhFAxC7ntkntV/1HOCi1x6HOCi1xwXN:W7ZppApryTeue6

Score
9/10

Malware Config

Signatures

  • Renames multiple (3368) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\299251bc9442da32799c3c9fb9d3d770N.exe
    "C:\Users\Admin\AppData\Local\Temp\299251bc9442da32799c3c9fb9d3d770N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1164

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

          Filesize

          57KB

          MD5

          a9cff89a7dfef44d30b9364ab791647d

          SHA1

          8c3b3645eb543483c698a9c27bf01cf33929b10f

          SHA256

          a7a7002e93c999aa8d0ab8d10f7e874d0b9d52e2b1df8d183537cde0aa3b0a0b

          SHA512

          a7594ec5b2c6875f96ce6ccafa737c1109679c6f97fde230c9f847417e9a999bb0b03763b3e3f0cb7b87d8f28d08f64cb353b23743da98bb0ab13e6d12724acb

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          66KB

          MD5

          101913d7b5cf729cecc1571c6fb4e437

          SHA1

          80dfe5f39382868091ca63bf6ec665feb0f0ad9e

          SHA256

          1daaba5aaed4452b92d7746a2542ab136647815f4ec6fbfc6cf27cd27c427c1b

          SHA512

          4cb41fc1793cbb59b5abd97cafa61717aa091602ebea03ae9c327503d519f356763cff620307ee059dc8be820038538b84111628de376bdf2692d5e9c0ccce33