Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 03:33

General

  • Target

    04f84ec42382d5ab11305a0a4214a075e7946aee851c9191bbedf4f0db875567N.exe

  • Size

    41KB

  • MD5

    00d6f8025badc3d192ab7bb211b58140

  • SHA1

    2ffe3df0898aaf090b5f37e4ca2a1cd08f9a70e0

  • SHA256

    04f84ec42382d5ab11305a0a4214a075e7946aee851c9191bbedf4f0db875567

  • SHA512

    2bac5ff0e2a0cc1e04331c9137ef3f11d8b4232c19fb7d73d5546b2337a2ff0a8f1c670a47b037518d8c46dd4152a9139f72e57f7150fa67b5aeb7cba6b723c3

  • SSDEEP

    384:GBt7Br5xjL9AgA71Fbhv7bhv3KueKudLl++KDUbdz3sJ/F8gzbdz3sJ/F8gC:W7BlpppARFbhjbhPKueKudLw1Dl

Score
9/10

Malware Config

Signatures

  • Renames multiple (3259) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\04f84ec42382d5ab11305a0a4214a075e7946aee851c9191bbedf4f0db875567N.exe
    "C:\Users\Admin\AppData\Local\Temp\04f84ec42382d5ab11305a0a4214a075e7946aee851c9191bbedf4f0db875567N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    41KB

    MD5

    820007bbf7b8d5f4d022e3be86c5c200

    SHA1

    ff6f2b1baca1e548ef999fa867a4dd39d386c749

    SHA256

    764d2f8374a264a98e4b2983c5ff3548bf0e7a4fc573a313ad3e519b43d13b6e

    SHA512

    00d7aeb5045aba45129eac2749e026f88b0a686841e63c5bd70446632fe5f0363c2961e9672a1dcef59848de3b131d68b83c554137fac3e8956d1b6cdbff2f97

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    50KB

    MD5

    80c14373110b1a2aba9524dcada46272

    SHA1

    54d7c6d2f1022f53bc151b76336d79b2fc97ca6f

    SHA256

    1f589a041bad2ccde2350e24d8c2fc8596a57a684c42bda8c8439b99294b930e

    SHA512

    d81c2eb5a45ac05fdff404e8cff93044bf7408dde9a66fbf58239eecdda0f271773c530eef9caaad3392ede52143ffdd82c1f751c3efb46ea40167c9db65f043