Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 03:20

General

  • Target

    f3e0f7d9a5a6fb6cbd90ee3588d087d8d9bd66a0a01ebb920b8cf05510bf27ecN.exe

  • Size

    88KB

  • MD5

    300905ffda341966e79c1e14c5a44b50

  • SHA1

    7de78e7d5fafdb936ee785ef4ecac05e5398604a

  • SHA256

    f3e0f7d9a5a6fb6cbd90ee3588d087d8d9bd66a0a01ebb920b8cf05510bf27ec

  • SHA512

    ed92f57b6d5106d39088dca62b338993373127014895aa93d7aa39d02688832d4b973032a8545e0a3edbd776000d98846111963e647c0ac0f1c327894b58cb65

  • SSDEEP

    1536:W7ZDpApYbWjIoPyPoLzV7c6ShWfxRfxDE:6DWpLf7fpE

Score
9/10

Malware Config

Signatures

  • Renames multiple (3158) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f3e0f7d9a5a6fb6cbd90ee3588d087d8d9bd66a0a01ebb920b8cf05510bf27ecN.exe
    "C:\Users\Admin\AppData\Local\Temp\f3e0f7d9a5a6fb6cbd90ee3588d087d8d9bd66a0a01ebb920b8cf05510bf27ecN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1846800975-3917212583-2893086201-1000\desktop.ini.tmp

    Filesize

    88KB

    MD5

    ed0b106a5e6adcc0d1772e2ccf263c34

    SHA1

    2bbbac00ca3718ce87f3aae672a57fc3d90cab24

    SHA256

    e325afd3c8e8142e21a5fb395c30a1cdebc690f1eac0e3bd1f68617325732059

    SHA512

    87373ee6b5dbe6a5478b48dd2202fdebd939af92437ac952c2fbc1ffe29356d5aca1f7f8dbc7fb1204869fe4a3ed6e06e09c10421e22975a18946ec8040e13a8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    97KB

    MD5

    1b1b018c068c92aa4191750cd9ad9183

    SHA1

    5518c521b6bf63bde09bb0c70ac123b7d7ddab9e

    SHA256

    1087c03c4adddab244d0db5df86b41ecd7f7f47aca84567260377d19904a1aa2

    SHA512

    50ed7fe062b8ba6d6bcb2f9eb5987dd430760e422bb570eb9bdbc6ecf197d3dd1342fc4f586106a0d8eda6fed1fa50baed1d54205ab73a00cca8d7e1d0732356