Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14/09/2024, 11:56

General

  • Target

    90f4d12f95c8f635ab1079712502f160N.exe

  • Size

    80KB

  • MD5

    90f4d12f95c8f635ab1079712502f160

  • SHA1

    119792998bbd6636855b9e57021ddf7779f04130

  • SHA256

    728c5cdb2f7fe50a9ac19d98f7562f8e8e98218ca4d66422d39f6c434afcf709

  • SHA512

    696028ff3e3681934c0afeb900816d301fd4a691bcd5b025b78c41c0a629446842d3927a225110f15f40041244b1a57a90de197036777599516eed107837cebd

  • SSDEEP

    1536:W7ZhA7pApMaxB4b0CYJ97lEVqNR7YNNdNpyI8yIRpC4Cm:6e7WpMaxeb0CYJ97lEYNR7kzlSnC4Cm

Score
9/10

Malware Config

Signatures

  • Renames multiple (3037) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\90f4d12f95c8f635ab1079712502f160N.exe
    "C:\Users\Admin\AppData\Local\Temp\90f4d12f95c8f635ab1079712502f160N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2508

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-312935884-697965778-3955649944-1000\desktop.ini.tmp

          Filesize

          80KB

          MD5

          2da63aa042145c5095e29ffb883ff6b9

          SHA1

          2a48068a56f78834d7eb3ab199a5eee015c4223d

          SHA256

          5fc104d787c2b8a5a2c135e11889e5e312572755e50fd00c0f95c70c26c08e08

          SHA512

          e4aa50a94b8f33d4968f56bb5a09bc372eeda3edcff1d8c49c5ef4110d626447f9568b959eb40f8946ed0275657a0c14367e78a0b87c7a9f75e713170978bfbf

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          89KB

          MD5

          dda55b745c11da169a0a72206072b1a1

          SHA1

          214025cd96bfb94ac6d84f365c6d56f76a2c3d96

          SHA256

          adf952bccd5e46e908788cb74f703937fd467fdc4565b109cc59652ed7d54e0b

          SHA512

          6b7b84d5bb820c02e3d8668892949445ea06b220c7b9e9085dcc85bef96b45fd077d9173d4bbf43871dc4e06daeaa8c64c0dc378b7c44592796a814eefc15d53