Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    18-09-2024 09:08

General

  • Target

    a77662d7795eb03658693f72f770c701d60e0ac69309fb1e6be497df57de7e39N.exe

  • Size

    38KB

  • MD5

    f332fcfa34e41aa67db9be66d39e7dc0

  • SHA1

    d51f15be5e39f419516717c53314105b30ea6ecc

  • SHA256

    a77662d7795eb03658693f72f770c701d60e0ac69309fb1e6be497df57de7e39

  • SHA512

    55ffe60370e3d189b0c3cd76025ae4739ea85c1a2e203051245e8d48964a936a6cb5df82ce261525ef07dfe3b3c78e74af07e2a249d8c6b0129c28b55562bbf5

  • SSDEEP

    384:yBs7Br5xjL8AgA71FbhvsIzaApAyJO3ApAyJOGiKp4:/7BlpQpARFbhxztpAyJ5pAyJZp4

Score
9/10

Malware Config

Signatures

  • Renames multiple (3418) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a77662d7795eb03658693f72f770c701d60e0ac69309fb1e6be497df57de7e39N.exe
    "C:\Users\Admin\AppData\Local\Temp\a77662d7795eb03658693f72f770c701d60e0ac69309fb1e6be497df57de7e39N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    39KB

    MD5

    2f19e2fd055ce7779c38fe678fc0171c

    SHA1

    67aef87ba4ee5aca5eab1caa230a58d36f2bd492

    SHA256

    c95ed9962dfcfd1efda80a7fa364ae6f8e3c14619f4d95ad09e92be017cac77b

    SHA512

    06e0ca2091c8d36df76fa416fa657a048ddea41d01690da2a9c64b65f985c4c1a6fc1b427c17182444bda1b5e301fcd88b149e10d8411e47ce428898f4adb932

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    48KB

    MD5

    dbd3753b147f362f2e5896eb2c23b722

    SHA1

    23fca7927f7a4b53cea8ab281eacfca15a1daef0

    SHA256

    bbc9e5bae088124623f71b9817a7fbc1d2dfd753fa33ad772af9aaf870763fcf

    SHA512

    c83be02f18642e2afd4187cb1b240d4d8b2154c891abd8254b30efaa9d9b5b95c70ef446e724631d7de89b377869f60389d050362e472c1765aa0c2889630faf

  • memory/2692-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2692-74-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB