Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 03:58

General

  • Target

    986f3e66f381adc302cf8a152f1f93e22dd4605d57adf257c6f85db0b2eb530dN.exe

  • Size

    45KB

  • MD5

    2dbe0774384f9a07b84078e48b7d14f0

  • SHA1

    a075c7070597525424fe2fc6a5d86398e23c706e

  • SHA256

    986f3e66f381adc302cf8a152f1f93e22dd4605d57adf257c6f85db0b2eb530d

  • SHA512

    5b4f20608c4346bb070270429902c38f0d2013ddb6f2779b4d313ffb436d8a72ed019a6cbad4fe036b86081d936fe271ecb64d9c4d6751c210e93be5c5df70d3

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42Lcfpb2N231F1ngig0:W7ZppApBULcfpHLcfpSo3f2x0

Score
9/10

Malware Config

Signatures

  • Renames multiple (3751) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\986f3e66f381adc302cf8a152f1f93e22dd4605d57adf257c6f85db0b2eb530dN.exe
    "C:\Users\Admin\AppData\Local\Temp\986f3e66f381adc302cf8a152f1f93e22dd4605d57adf257c6f85db0b2eb530dN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4177215427-74451935-3209572229-1000\desktop.ini.tmp

    Filesize

    45KB

    MD5

    a23b41932b1893d977722b6335aeabaa

    SHA1

    480d3439558d6b1dd3f5877a9fc3dd1b16ab7681

    SHA256

    e24180c5093de496191a27aa7addb8e811e923eec50bd437b16b114a827a3b39

    SHA512

    bf6d675e0d845a4e1e5d26c6d9c8e62c19d38e121c9f8ead2109dbf5a74cf573334df6c6be0febbb95efe384cdb3b5f36cdad677a88dd66a8738025438a3a3a4

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    54KB

    MD5

    a2250af7048f6a6455a3694b7fc256da

    SHA1

    0d5a280788d0c399c98a1dd6db3894cfc21dfc38

    SHA256

    f24f97726da359bb922741fc01d46963a27b981d84c5fdbdb51cb1a47ee133a1

    SHA512

    a55ace02c6dfc0a414883bd6e31193d2531c4fc8a24745de1e52695786bb80211417b855bd894c47bb0a39c715dad43f117a194b29cb3d89ec016230a815db34