Analysis

  • max time kernel
    119s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18-09-2024 09:11

General

  • Target

    d4b0db9c340c3b0dc5a8875cbe03f2d5e9bb32d7e2524faa7f2ff61677f5595cN.exe

  • Size

    98KB

  • MD5

    5e08bc039f6052a6a7ab194dbe3ee5b0

  • SHA1

    8ec87987d4f4f5beb12e31be2f4739ff5c4e9435

  • SHA256

    d4b0db9c340c3b0dc5a8875cbe03f2d5e9bb32d7e2524faa7f2ff61677f5595c

  • SHA512

    afe6949f707b4a657895abc05998dca7d02abbe08ff31415442fc7637888dee99e0f887deb8c26b1035844a11c9a9449905a3420791d72863ce3f08eb5da329f

  • SSDEEP

    3072:6e7WpHIyRF9ESWu0SWujKsKRsP9fVL9ileq9:RqlIyFESWu0SWu86jYleq9

Score
9/10

Malware Config

Signatures

  • Renames multiple (3152) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4b0db9c340c3b0dc5a8875cbe03f2d5e9bb32d7e2524faa7f2ff61677f5595cN.exe
    "C:\Users\Admin\AppData\Local\Temp\d4b0db9c340c3b0dc5a8875cbe03f2d5e9bb32d7e2524faa7f2ff61677f5595cN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

    Filesize

    98KB

    MD5

    a692d4bf3573e3fa09ceed67f56cc203

    SHA1

    b39594154df2942c886679f3ab306e9b52b4561a

    SHA256

    2a442f45627579195951ed2805471cdb41f453af5470ea1d5021de04bc316404

    SHA512

    4c2704727cf61a60c7569e4767f51f47e5ca6a4914b678cbecc66a33b5aad82675854680011c687155ac9e84827af1fccd02e18bb17ed6ed826b847a88cb5157

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    107KB

    MD5

    aa72ae6f87b250fd64ae81b9ee378f9b

    SHA1

    3420d8ce3d2584108d380f8243d6a5ccc6a3e148

    SHA256

    ab2045aa0558927257a5669a298cbbba19c99c008d611f95b0bb41d0046b24fb

    SHA512

    3b92271b5391976f5364c08281f52a87f4181cffe9134eaa249dd2704709870f3e7743a2046ea583c78b28393f20416ed68dccdbb3b4c0796431803b7a5db25c