Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 02:56

General

  • Target

    d88ac5549e5d3eb94e57a60e666adc4ef5ab9f3b8070ca258f763a11822643c6N.exe

  • Size

    67KB

  • MD5

    6f86315772ec548258b32220db4ea460

  • SHA1

    69f2330920a8c92065db464afd52b1b8da376508

  • SHA256

    d88ac5549e5d3eb94e57a60e666adc4ef5ab9f3b8070ca258f763a11822643c6

  • SHA512

    b9467a52cde847fa3ef437c6fdbea021c837cb313fad99e3edf8a959b8ed82d08dcc317c0d0a7f674b91ce5a54e81260b9bbf21e00c8832921e94a487d11a7fd

  • SSDEEP

    1536:W7ZNLpApCZuvIYXxJ75sNpJJ75sNpyPIXxXXS+Sy48Rf:6NLWpCZLYFXxXXS+SIRf

Score
9/10

Malware Config

Signatures

  • Renames multiple (3274) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d88ac5549e5d3eb94e57a60e666adc4ef5ab9f3b8070ca258f763a11822643c6N.exe
    "C:\Users\Admin\AppData\Local\Temp\d88ac5549e5d3eb94e57a60e666adc4ef5ab9f3b8070ca258f763a11822643c6N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2076

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3063565911-2056067323-3330884624-1000\desktop.ini.tmp

    Filesize

    67KB

    MD5

    34a7f0712cff953bda5a5f05dbf3aa8f

    SHA1

    841d1ee756ad15e347ffad6109f96670fc3e6354

    SHA256

    c86717e0f34022759a2bd9d36d41402aeeebc9efb63ac6ddbf9c66063dc0599c

    SHA512

    b5540a2ef3b464aa5f0383574431408b8f1c13dbafd9c11cddd75dc6dbd032362b8e4ddec2e5a71fbba71bfb6250cb1d48c025c045fed74ffe9978eea1079048

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    76KB

    MD5

    d770d0d6180fa1787907ac36af19f950

    SHA1

    6f26cb47812e8235474be0bae8f0c7ea1915cb5b

    SHA256

    7010d75e3deb3ae301d12cd80092edd0041aa1e8c9cd703e143d20addb073095

    SHA512

    0a2fd4f1de6653c38b50ebc130cbe09f882cdb595ee898d020ea4f1430a6fd062b3373ca302c631088c0c8008be549b161d579aa66d201835a61040b874453a2