Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 02:00

General

  • Target

    6caac17d5c75f27b9cfb63bcd132686e3599a0abcbd4e7fdc966d65b12cd469eN.exe

  • Size

    44KB

  • MD5

    864e5f0aef740b15b117255cc5054b30

  • SHA1

    eeaedd721d31e008f4eba0f574bef47a769aa20f

  • SHA256

    6caac17d5c75f27b9cfb63bcd132686e3599a0abcbd4e7fdc966d65b12cd469e

  • SHA512

    412c82ae730ef8ff62a0c1a108b93cb90fc6f64916799ddb965e2bfd05140db9f043ffeb78f1038ab7d63fbafa520a49d9fe55d58a9856a3d112b69f7543ec7f

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfproFNF2B5dB5N:W7ZppApBULcfpHLcfpyD2jdjN

Score
9/10

Malware Config

Signatures

  • Renames multiple (3730) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6caac17d5c75f27b9cfb63bcd132686e3599a0abcbd4e7fdc966d65b12cd469eN.exe
    "C:\Users\Admin\AppData\Local\Temp\6caac17d5c75f27b9cfb63bcd132686e3599a0abcbd4e7fdc966d65b12cd469eN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-312935884-697965778-3955649944-1000\desktop.ini.tmp

    Filesize

    44KB

    MD5

    a76dd33309728fc162bccae7eee1bab9

    SHA1

    050e811c1223dd0c19d9950cb2a440a73dde6974

    SHA256

    44a1bf6b9841b51bedd1cb4f9d48145501fe375a8a0dcc098cf38a394cda7a7d

    SHA512

    da432e04ab875bb81e0d1f050dcf69ac37a064b924b1f47b48ab36afca56a231d8f5ee0900b33d5555110efae3368076f55a3500165ed795c2ba663a7d49f6c8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    53KB

    MD5

    7e1f5c7086b2076507ba1aac1b3be47f

    SHA1

    6a102aaa221cb4e1ca4be3e9c026fe3871e469b8

    SHA256

    9fff4faf15ae0712089835d21951e4fd6d1c70e6762030afd83dd00a5debc669

    SHA512

    fdc4dfa07feb2f9748bedff586851dd8e5f35a7ff7e7691f77d59da68d3e47e1ee5b8b3b77352ab3e9c69f69b67e5f5e70c2bc8fa46a7496384df2b09cb55b81