Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 03:59

General

  • Target

    98add37e825658e3cc2185b85cbfba9be46d63b47b0b850063ae93c03e2f6979N.exe

  • Size

    36KB

  • MD5

    54435baf6a71490816c4a440750ad070

  • SHA1

    868ae9edd65ef75347a0009616fd46d7d3d46b86

  • SHA256

    98add37e825658e3cc2185b85cbfba9be46d63b47b0b850063ae93c03e2f6979

  • SHA512

    1f0aac5b9caa0b6a20ab83866a05ee8caf4ce1a1b3d0062869740043b3fbe29ddf0596b937de77bf42ce1c82485a6f2a9aed847a8e78918a38398600b76a72f5

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfpKJ2pqpW:W7ZppApBULcfpHLcfpKewW

Score
9/10

Malware Config

Signatures

  • Renames multiple (3737) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\98add37e825658e3cc2185b85cbfba9be46d63b47b0b850063ae93c03e2f6979N.exe
    "C:\Users\Admin\AppData\Local\Temp\98add37e825658e3cc2185b85cbfba9be46d63b47b0b850063ae93c03e2f6979N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:780

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1846800975-3917212583-2893086201-1000\desktop.ini.tmp

    Filesize

    37KB

    MD5

    240b47b2c77be4f888b030e74290e930

    SHA1

    22162ad6d667ab20939b9b604c7a05edbb5c553b

    SHA256

    9564996a6b0d7984c223663a2a0c8ed0b2d9f00f8e99d4ae4a8cfe9ed3e25f76

    SHA512

    b1392a807c0cc22e7006687b5ef51afc0406df170e75a51a2d5e7312eca6f6cd5932e435823655c57eb994a94b7f510f156719bcc7caa3195cf363caf21623d2

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    45KB

    MD5

    0b7c1bb8fccf2fefac26f86f31aa30a3

    SHA1

    f52fede10a0bcc941abb8bac8ca9de9ca0243f53

    SHA256

    fb9d4eac6483696ddcd4c50c8fc2bf1c6bbbe20b9679e0beaca3c389630532be

    SHA512

    8e93527856e828f3ef2418bb1c0b4076d7390148b68f6cfcdbe08e5f21db084444afaf6aa4333a1359ba897859e227a95793d0b35657c9991f2bd89a021fc8c4