Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    18-09-2024 09:22

General

  • Target

    915143c5bf7711efcdb5ec4108a7f00b09f191a7c6becd6153a0aae954e3a193N.exe

  • Size

    47KB

  • MD5

    7df9cb950eb855f0329d9dd1be9a9c70

  • SHA1

    7c4a6514d7d03f4a7a01003169c0e1b72a3354eb

  • SHA256

    915143c5bf7711efcdb5ec4108a7f00b09f191a7c6becd6153a0aae954e3a193

  • SHA512

    593faa3e99da960c2643178bfd95cc3c799df52a5678e67f8450bfdb9e1b1237a1d13890bb6ee32c68071bc1fbca6e25527e3c4879d438c67a0bb45738d81285

  • SSDEEP

    384:yBs7Br5xjL8AgA71Fbhv/FYzyKbNzzyKbNUjZ2S8W8Hoz:/7BlpQpARFbhCWK9WKKj38W8Hoz

Score
9/10

Malware Config

Signatures

  • Renames multiple (3443) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\915143c5bf7711efcdb5ec4108a7f00b09f191a7c6becd6153a0aae954e3a193N.exe
    "C:\Users\Admin\AppData\Local\Temp\915143c5bf7711efcdb5ec4108a7f00b09f191a7c6becd6153a0aae954e3a193N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    47KB

    MD5

    344f6d813ad6de3a2e64812145c771db

    SHA1

    8a36e76c8f1efa75bf4705505d7b434b777f97b0

    SHA256

    f2622d01c46642388b964c1085308e11064c3ebc129c56985e7206ff3b79626c

    SHA512

    c5003f24eaeced4e2fe6aa2251c036e24b5103ff86d232e7d6866230eef8a9c6fb889dd7944a46fbaf754b33f2ed4c3c5c09d9fe410169f851493a619650ad12

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    56KB

    MD5

    791de2a4742d507717273fb33ff39b74

    SHA1

    ef697959687c6523cfaceb00fb629fe3e858060d

    SHA256

    0340353c538218f8bf7d14c4890a30e5fd81b0c66aaca8c07c98aa67bd7b5641

    SHA512

    58d31b8edd6dac539da3c300751a1b48cb5a05097a71cfa8584963c374213cc65e1ce4b29c2d5cd46ce05ad190983c9143895452a1d3c5ae92a53bd9a63e8268

  • memory/2748-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2748-74-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB