Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18-09-2024 09:12

General

  • Target

    5016f4c57a34fb9264e92e226b54d992769a7375abe7db767194741d65a4f062N.exe

  • Size

    89KB

  • MD5

    9cf35d637f5e1da1e61082676adbb390

  • SHA1

    6965f6c794ceeea75c445384d3abcfb8b9dc6bcd

  • SHA256

    5016f4c57a34fb9264e92e226b54d992769a7375abe7db767194741d65a4f062

  • SHA512

    b0e4eec6ac348b78930d5d195e4ac389a67751c2d1a1b32fd81ed8548405b1f79748a72ece9764f1400636c11c0da1b41a6f416c5a48554046b6d569d93d6b28

  • SSDEEP

    1536:W7ZhA7pApH9QHwtRF9ESWu0SWujodsodaNovTW+SPL+cycWAF689ilL:6e7WpHIyRF9ESWu0SWujKsKRsP9fVL9C

Score
9/10

Malware Config

Signatures

  • Renames multiple (3121) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5016f4c57a34fb9264e92e226b54d992769a7375abe7db767194741d65a4f062N.exe
    "C:\Users\Admin\AppData\Local\Temp\5016f4c57a34fb9264e92e226b54d992769a7375abe7db767194741d65a4f062N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini.tmp

    Filesize

    90KB

    MD5

    e5ac7adfb45849f8dd845e7d621da8b4

    SHA1

    56fef604f4c305a9796dccddb092a31a7e403c13

    SHA256

    d2785fce13b30855ffef1d25b52dff23dd03c480fdd10de74ef88601c5e90baf

    SHA512

    adb38edf4aec7a0165ce196aa403f3c66a3a64b729ed1b3f7409dba2402b2be679301e8cad6ef634ed970f4661ade23ce096c214c9eff29d9d43137c229b4a8b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    99KB

    MD5

    1bc97860e0b7054c685621adc90bb3c2

    SHA1

    e76249e303d35c0b45a5bf5d0369b6255d6d0863

    SHA256

    708759a231b1ec0690bfb7d0ee680861f46225969184e882ee20fbfa656887db

    SHA512

    dca056e62ac2467c1c51df3325fdb338ee87fff00ac5daaaee88bea7658d2b10c9de6450cac6285ab79672ff894febb5ade1627ed8f5647fcc5e4faa5eac6d13