Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14/09/2024, 18:36

General

  • Target

    868329fcc31d14c139e0b8b9b2eb5260N.exe

  • Size

    37KB

  • MD5

    868329fcc31d14c139e0b8b9b2eb5260

  • SHA1

    ec6e6c7ad93d67a3b10830b7747aa1d9ac021787

  • SHA256

    7e1da40bf175feeb8deef26eae831f7901b05056971760dd0e0963931532d2bd

  • SHA512

    7beee83ef39e749aff0672d979d50606770d8ca1d92d648a2ed210affa50c80770a416ca3dbb00e2e764a66a5b78a784b127c871d3ec5a2d3ec4d28763ae12fa

  • SSDEEP

    384:GBt7Br5xjLfAgA71FbhvtPci1lnYOzlnYO5+vu+vlP9PD:W7BlpDpARFbhzbYONYOkt9P9PD

Score
9/10

Malware Config

Signatures

  • Renames multiple (3429) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\868329fcc31d14c139e0b8b9b2eb5260N.exe
    "C:\Users\Admin\AppData\Local\Temp\868329fcc31d14c139e0b8b9b2eb5260N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1996

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    37KB

    MD5

    ac9564df6dc87b416f78add3673ad27d

    SHA1

    42c6301b34a1aea324f82c0d5aa256d3bea30f1b

    SHA256

    eed1f6d763de3468c42499e1376e8200aaac5dc2762befcf065cec7648c5ade2

    SHA512

    9981f589e7faaca9c65d81a7d65e42e328b77b291fe4beb0d7bb8700f600995b8f6b620372ad8b72ec5920f008380241c863492868fe714700a1d00fa162feb5

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    46KB

    MD5

    522349a91308eebe84585efed49eb97a

    SHA1

    cc1b0f073bbd8b36cea09a9c16b23ebdcffd4a79

    SHA256

    d84f9aa2651743357e7b47a38257219e72b9bf6dde6f7b7a66be739006822a60

    SHA512

    fd332335db8402d295d2b28cb35f33db634bf825446183950e479fccffd7c07512ebef7d5965aa09bc6ca301090a253327ca39826604eda639b09f995dcb1c8c