Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 03:55

General

  • Target

    249225e2627709a7198ac526626b3744c0ff5791c5e6f3db3fd93afa1c12647dN.exe

  • Size

    51KB

  • MD5

    7c3ed8255af73beffca8fc3e87296e10

  • SHA1

    86a1b5d56b1ce33d02dcbbbe35c29d1f7e80e2ea

  • SHA256

    249225e2627709a7198ac526626b3744c0ff5791c5e6f3db3fd93afa1c12647d

  • SHA512

    f93773fdc5907e08a9a598494e15fbfc43569e41142ce5614981dd7ee50042f5c544b2b0035a765de6a882c64d13e9a72e4bf747ad4d2dec92851a37bc70321e

  • SSDEEP

    768:W7BlphA7pARFbhL801VvM801Vvv7co49OiIJrbOiIJfo49OiIJrbOiIJsPIvPI0:W7ZhA7pApw03vR03vog0gY40

Score
9/10

Malware Config

Signatures

  • Renames multiple (3287) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\249225e2627709a7198ac526626b3744c0ff5791c5e6f3db3fd93afa1c12647dN.exe
    "C:\Users\Admin\AppData\Local\Temp\249225e2627709a7198ac526626b3744c0ff5791c5e6f3db3fd93afa1c12647dN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2872745919-2748461613-2989606286-1000\desktop.ini.tmp

    Filesize

    51KB

    MD5

    70445ca9bf765c393f43ceefbd22ac9b

    SHA1

    78cba65b82d69355aa34fe602224a69f50cefded

    SHA256

    99ec846b33130ff1433c8fc137a3fa4de0fd844a3e280075c38383814535e593

    SHA512

    46f08065cbf8ebc5fd79e16f1093c6b56512d692e3f3897185b413139878b2e364a13e3f7ca3cb100adac005b15c6ab38fdbed16ca75e4de8e299ebb2443bcaa

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    60KB

    MD5

    7542ab0a07ee0a3439994b5cbaadc66c

    SHA1

    97b49b8d5cf0c3316ca868d4ef3b8267e7ed9699

    SHA256

    86c687179f819f9e8c115045559cfbcbba5f547dbf3dbae52ca93e96b9fdc58d

    SHA512

    97bb74a61312843532883a045378a11e895585cf8bc9f6102dcc233bb228a210fa81409c90747e8a72c1ff8d8cfd08f82fb5174f8b2f05a3b7b7c3745b940980