Analysis

  • max time kernel
    120s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18-09-2024 09:07

General

  • Target

    6005d3d119af146a73498c20ddab65a168a164b047d3b2b4c3ba924370d9a64fN.exe

  • Size

    40KB

  • MD5

    cbaa84be8862e7947735eb57967c7580

  • SHA1

    3cdcbc58b46f15a28e31f43e89a31723e470fdff

  • SHA256

    6005d3d119af146a73498c20ddab65a168a164b047d3b2b4c3ba924370d9a64f

  • SHA512

    c499b1309dc2f5209914469018bcc2599788537ce3a918db34af65e57cf140854c2b2014812c4636bada83075922f92a8cea95f0790b2c080560c82379e95a73

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LOl6Sl5lsSF:W7ZhA7pApM21LOA1LOl6vSF

Score
9/10

Malware Config

Signatures

  • Renames multiple (3343) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6005d3d119af146a73498c20ddab65a168a164b047d3b2b4c3ba924370d9a64fN.exe
    "C:\Users\Admin\AppData\Local\Temp\6005d3d119af146a73498c20ddab65a168a164b047d3b2b4c3ba924370d9a64fN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini.tmp

    Filesize

    40KB

    MD5

    c6fe049af24add174c846df8d7840c86

    SHA1

    396f7f2bc3ee66a2a80dc69479582e04e0498795

    SHA256

    3a5a8e06fceac6e9ce873100b40696c51b6475180103de082260efc109723ee4

    SHA512

    ab9370942a64a63421b56ec7547b07cc5bd018a6f0c1a4f340dbdac853b96fb49797d032b0ab953198d995ea6616ca295c6396483b687c8f42bd12d5d133bcfc

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    49KB

    MD5

    fc5fee969a7d2ed0e626e8414098fe91

    SHA1

    32721c05cd828f1f9f59ddce00c5977024e77d18

    SHA256

    71e7772460b167bbfa449638d00eb3aab549286d07e46e43fa19e25c285a55aa

    SHA512

    bc396828ec6c45483f7e66f1f55360ad50c1cc47d44ee4d633a4e57d85eaf96ab563ffb2aa57d0eabd438ae7f5ceaf1532262069a263dc000b21ed94f0a7e22a