Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 04:38

General

  • Target

    56a1d7a202834638b596b5bcca4843a794d888c3d81799f66ce41eadeafe2d45N.exe

  • Size

    34KB

  • MD5

    b8d96b9e53532b931676505d77f1e9c0

  • SHA1

    d41718a3dba3f939a2061d343e552d791b79d80b

  • SHA256

    56a1d7a202834638b596b5bcca4843a794d888c3d81799f66ce41eadeafe2d45

  • SHA512

    229a48e3354432acf49b665d6f21fc7b450d8891c1bfebb550a750a58eada886a0f463e1ae2cf671a93b7d7b662b1322c01c406a18436f26346da38a214c15ed

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LOl6Sl5lt:W7ZhA7pApM21LOA1LOl6o

Score
9/10

Malware Config

Signatures

  • Renames multiple (3343) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\56a1d7a202834638b596b5bcca4843a794d888c3d81799f66ce41eadeafe2d45N.exe
    "C:\Users\Admin\AppData\Local\Temp\56a1d7a202834638b596b5bcca4843a794d888c3d81799f66ce41eadeafe2d45N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini.tmp

    Filesize

    35KB

    MD5

    ea197c24d1609a0018af2cec9355aefc

    SHA1

    7cb6ad4e2f57cf130ece5bb69b01d977ba598768

    SHA256

    8a885070ee8381ac9978e62037ea6805e331fe3ffa6c928fa6e01ffa6d13adb8

    SHA512

    16559d834cbd7afd173c102e3c70e1bf587071366ec16b9a73f9ec8fc4232307df72081f476c69ecf79feb4831dcea3b12cc9962f969115cce4a000b079b5b69

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    43KB

    MD5

    5b636ce741a936ebd4e8a3db855b0925

    SHA1

    db884a4d900b8f79964dd75426fa662bbd935a8b

    SHA256

    0a5237859125b9d1a810fbebbb1789ac721f4dc68dd233aaa1dfdd250a142c6d

    SHA512

    ac60b9b75388d8e3884367bd000fa7bf28b97125e58195616ff1502615862f1e0f36a65bf4d40324e8ec6c6fed974b96f5cdaab25167a4a6504e1c6bd234894a