Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 04:05

General

  • Target

    21e05ec1d25fbd8a6a56d330b557d479f1bad01b3a36b65d032cc56826b0c527N.exe

  • Size

    67KB

  • MD5

    c8995a93b9a9a68d0abac378a3e09650

  • SHA1

    a417a5dc5fcbab0e371fd87d0f3de5b01e61ad5d

  • SHA256

    21e05ec1d25fbd8a6a56d330b557d479f1bad01b3a36b65d032cc56826b0c527

  • SHA512

    0364d794c61dc280ebdb15d73a9b9bcf782aeff9d47535a4a50d2ef09d1ce44bedae4935975eee83ed7fb3536bbfa78797d02ef9cb2e9c024e8036da7ac69ed9

  • SSDEEP

    1536:W7ZppApBULcfpHLcfpX2/Nw/NwmxLTopK:6pWpBwchcV2WxLTl

Score
9/10

Malware Config

Signatures

  • Renames multiple (3135) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\21e05ec1d25fbd8a6a56d330b557d479f1bad01b3a36b65d032cc56826b0c527N.exe
    "C:\Users\Admin\AppData\Local\Temp\21e05ec1d25fbd8a6a56d330b557d479f1bad01b3a36b65d032cc56826b0c527N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2300

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    67KB

    MD5

    e3f6eb9c9b68ece07291247a3cbb8eda

    SHA1

    b49376457c50cf0cca2615b7aa51ab321bebb5b4

    SHA256

    710744df064931b23ee37098d7c579db007a3ef1e3bdc9fe2f6060066e344377

    SHA512

    a8d621af9d1c1c762dafdf71f09fc61c321ba58a0d271ebbbdf443303af93f4266c624a23dfeea06041a3b7ab0fbdb1513aa59bb504b3be7cbc0a5d064f27733

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    76KB

    MD5

    4194f0dfbc725f94e94b83603965520e

    SHA1

    f917bcc95b6a825fa4e7f5bc1cfaeecd92de36ce

    SHA256

    d309179a531c55f8a48ade697033211f5ed943d006379d611b1480b2e605de30

    SHA512

    f57b5262a6c82ad480b084db2d8ea5208dbb8bd025f89481e41daab11b606e722a0610164c5154b5943828d830d9144b101b7e891894a52a87fa538b8a9ae931