Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 03:45

General

  • Target

    25f4fcb2b34a25f8af78edf64c3be8e29678a202f4baa449e039d98b857435f1N.exe

  • Size

    60KB

  • MD5

    bc284eff56fd7f82095e19b751f66200

  • SHA1

    ce8cc2916a2406df00b566d394bccf6e06b3c3d3

  • SHA256

    25f4fcb2b34a25f8af78edf64c3be8e29678a202f4baa449e039d98b857435f1

  • SHA512

    daf84ca69af0273540293c2ec7368d6830ebb50e4c47e6b3601fb9754c8b7bc453cc48f7790c0acd60bc33789feb83ad80db1a1947954ce5bc5f0f0a46327299

  • SSDEEP

    768:W7BlphA7dASbSjJJ1EXBwzEXBwdcMcwBcCBcw/tio/tiC8r8UQ4NQ4k:W7ZhA7dABJJ7TTQoQD4UQ4NQ4k

Score
9/10

Malware Config

Signatures

  • Renames multiple (3096) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\25f4fcb2b34a25f8af78edf64c3be8e29678a202f4baa449e039d98b857435f1N.exe
    "C:\Users\Admin\AppData\Local\Temp\25f4fcb2b34a25f8af78edf64c3be8e29678a202f4baa449e039d98b857435f1N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    60KB

    MD5

    92fbff4f2e6a7478bfff049883d8bae4

    SHA1

    77cd3c6305c52a47ea80357ef5b0c15614ec37ca

    SHA256

    bfd3d86960b6343e612c0c483a1c72fa94954de04f2325a06b1eb7693af1ec02

    SHA512

    b75af6f51ccf1586249bdd346b06d56773e08b8282f6108a1c808f97f48d303540e1ff4e4a29f222c3b7e5e6760b33367c06fd4b3e07d670366c0d9993070671

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    69KB

    MD5

    600e218967f3aac0bf12b36b95d541e9

    SHA1

    246a44683a9d4a3629fd8ba526c7c7fe72ec539d

    SHA256

    ab14b1e001abedce3e25c2b216da254ea1b6863385785bd9e7409c5310427ff6

    SHA512

    f6bd2466bb9bd114a4beddfc1b5e5137fd6d044a90480b6d6d2d65629b17bb4afadb80396f449ece53d2bd19f715b6f2d199cba4020a19202c03e1d426656957