Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18-09-2024 08:53

General

  • Target

    972b8d121b9eb2569dee03cbf03f680803500e9ea686b84717c0a03e71602ab0N.exe

  • Size

    87KB

  • MD5

    6be3e7fcccda9604496f7e4b30af0420

  • SHA1

    c0fc97e4289867c68a0c0480492db55ccd704fc3

  • SHA256

    972b8d121b9eb2569dee03cbf03f680803500e9ea686b84717c0a03e71602ab0

  • SHA512

    860420ea9bc812dea6bcd4ae914f0544ee5ae7f902080a7114b90686ee5c8f137922aeffdb45fde236a077328e8c95d9268483c28c69956b06ddb72765be5ebd

  • SSDEEP

    1536:W7ZhA7pApMaxB4b0CYJ97lEVqNR7Yge+ejy0Wjy0WzYgqe1:6e7WpMaxeb0CYJ97lEYNR73e+eGG1qe1

Score
9/10

Malware Config

Signatures

  • Renames multiple (2949) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\972b8d121b9eb2569dee03cbf03f680803500e9ea686b84717c0a03e71602ab0N.exe
    "C:\Users\Admin\AppData\Local\Temp\972b8d121b9eb2569dee03cbf03f680803500e9ea686b84717c0a03e71602ab0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3533259084-2542256011-65585152-1000\desktop.ini.tmp

    Filesize

    88KB

    MD5

    79fddb1ccf85826752bc162e6b93033e

    SHA1

    93216b8fcfc4db52704c9571c0e851c4ed9a8807

    SHA256

    52ecf0a4dc0757593fe0ae9c2ffb0dbad3aefdc4742c1d74b7aa51708f236530

    SHA512

    53e56488a956b8ebc5c87a75caeac0b35c50dd1466d0132f66c76797c845b342cddc40952c8289e0e0eeb97148be94478162d40842f718af0036b4c476f7331b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    97KB

    MD5

    a95919387e2a49a2364ae29f8b15d0a2

    SHA1

    d32154a1cc6173e1d38e741c4a3265d7159a55c8

    SHA256

    38761c3adc9fdeb76b8bf58f1ca14a2abea0dbb19859b9df1b13fc6da7eb37a3

    SHA512

    ac0f157f56de93e055904a78edfdb6d1e429480bcda9fc7e7225638e17fc93e5d5113b152df827ea9760cb44b3a30908999c4f2c2b9df57938aa34231cf9ddeb