Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 04:04

General

  • Target

    09ae071cbadc51357b37edfc7299d405760e966eb699c3126a752015d8f5a5e9N.exe

  • Size

    44KB

  • MD5

    bcf7189a3f8a7d9176ccd44ceb015a50

  • SHA1

    0400e8e2d4384f874195127d3827f7e9461db06a

  • SHA256

    09ae071cbadc51357b37edfc7299d405760e966eb699c3126a752015d8f5a5e9

  • SHA512

    d334617768a3089440d7efcb7b943c129e051d0aebfe22fc8539baa121f04d0c61365b7f5b1c41eb5ae1364e5c0c8f7d42fe029f77b7b99ff65643527adf5d2b

  • SSDEEP

    768:W7BlpppARFbhknrzzA8JQ2AdJCzA8JQ2AdJcUYULKLQKLgoRo2:W7ZppApkxUYULQQQR

Score
9/10

Malware Config

Signatures

  • Renames multiple (3206) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\09ae071cbadc51357b37edfc7299d405760e966eb699c3126a752015d8f5a5e9N.exe
    "C:\Users\Admin\AppData\Local\Temp\09ae071cbadc51357b37edfc7299d405760e966eb699c3126a752015d8f5a5e9N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

    Filesize

    45KB

    MD5

    0e2097fd1758dad8b34da0f50b294312

    SHA1

    929cd598c5a050555162632aa19d561fb8ddc806

    SHA256

    51b94f52dd4d771e3961ebd47501d9bcd74acbd709796b3d5f05ccd4dead5b35

    SHA512

    10aa32246e70897df03a33f211304835ea6db014703cb2f83fb23cea6e2cbe490a5c5bd1868bc16ce9be26c681cda4212d973c6b042480d535dda63f7526b9fa

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    54KB

    MD5

    cb824ae1d479ad6618a7de5b96759866

    SHA1

    0a2ba8e6acf84eea66cc26b2f88d7dee5355b74d

    SHA256

    64629fef13485f19c27a269d5b1bdb9cdd0d2f4854069019f5b69995b2319bdf

    SHA512

    ea486d13a61cf1b2fcf560a9ac7e5eff72c3ed57e914a8d17fdce6649595ac57f7af0e0aa821d1f111c985db77f9e7d03ef1e1850ff353162c21954af5856a0e