Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 05:28

General

  • Target

    09048bc4633299692a032e40cf8c29925ad4973fc3191ef1b70b93a9cfb5ccc8N.exe

  • Size

    90KB

  • MD5

    536c859b7bf8548f8eaf0e5cf4409c60

  • SHA1

    4b2016ce32c1b18f875e9a2eea982c895478f556

  • SHA256

    09048bc4633299692a032e40cf8c29925ad4973fc3191ef1b70b93a9cfb5ccc8

  • SHA512

    72df4077e81969e7b5ad85407e12b21fd41c4ae3d759ec4cdf8a0e865821b324707366a4463b675593dc87b2c125fbfe13cfd225348f0f97fc253dec2d64cd3e

  • SSDEEP

    1536:/7ZQpApze+eJfFpsJOfFpsJ5DQ4PN54PNrqXqo:9QWpze+eJfFpsJOfFpsJ5D7WA

Score
9/10

Malware Config

Signatures

  • Renames multiple (3206) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\09048bc4633299692a032e40cf8c29925ad4973fc3191ef1b70b93a9cfb5ccc8N.exe
    "C:\Users\Admin\AppData\Local\Temp\09048bc4633299692a032e40cf8c29925ad4973fc3191ef1b70b93a9cfb5ccc8N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:592

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2872745919-2748461613-2989606286-1000\desktop.ini.tmp

    Filesize

    90KB

    MD5

    d86d9d3757fb08ad36c9e46ce458fb5e

    SHA1

    734ebdc6d3cdc358dcfc55e6527694ffa9756a7a

    SHA256

    c97e691d59f2a952368617d9e6d8ad6c4b8b624f5c3e5e009ff976021c55e10a

    SHA512

    5be933bf88713d5b8e0e94e256e315c1b11b23731d6992aa9ddc574ea4378d068d57977c80d29e6f2cfb249a7fb602571fbbc69d56aa7d8f39669edb53a46574

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    99KB

    MD5

    3611e10c10ab916b234ffd583f875f83

    SHA1

    61cc73f2c9009068df57134645a839e4ffc76d97

    SHA256

    6d5d3e4936da6dc4abf4a018922451e0962cd71ae6c7bb938c7dc3fc004ac4b6

    SHA512

    87d27c22e3be3b927d4b56dcd6c8b660baf42414fe65b0a441764182fda90474cf355060b9a3807d44a6250fd87700f0b2f20f42263500ba198a5cc727ca74b2

  • memory/592-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/592-74-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB