Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 05:35

General

  • Target

    a20d0f61aa6376f9e572caa7f8676cfd2902691e13562cf7d10e78d8234689d0N.exe

  • Size

    75KB

  • MD5

    1dce7d43aedb46eba0bf6f4309ee16b0

  • SHA1

    b6efdc7c2c32fea9c171c2f82f557a832a089ce0

  • SHA256

    a20d0f61aa6376f9e572caa7f8676cfd2902691e13562cf7d10e78d8234689d0

  • SHA512

    4b92afe42601562140da43b5a093ed9ef80e7f78bfb3872fad6b5c59d21f5c0ce41fbb6dd114e70f757456ec758168447ab8d116fcd784a2ef11a84c814329d8

  • SSDEEP

    768:W7Blp2sspARFbhJpupZ5pZ4+fTgTvlK1lK6RZR+8/8gClurYClurver+:W7Z2sspApkZrZ4+fU7lK1lKT8/8tT

Score
9/10

Malware Config

Signatures

  • Renames multiple (3704) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a20d0f61aa6376f9e572caa7f8676cfd2902691e13562cf7d10e78d8234689d0N.exe
    "C:\Users\Admin\AppData\Local\Temp\a20d0f61aa6376f9e572caa7f8676cfd2902691e13562cf7d10e78d8234689d0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2872745919-2748461613-2989606286-1000\desktop.ini.tmp

    Filesize

    75KB

    MD5

    b48d94f617cfb83a3653d4c4f346f3de

    SHA1

    8a346d49df54f985bd0ef2bf99b4fd903033592e

    SHA256

    44c1d26521f6fcf42e2b25466f95585d4821882f49d42ae35aa0f2b4a3f34682

    SHA512

    60f6e23442eb956a7113f024a66ba813fdfd935d346778b92ebdd76b1c7a66e6f3f62828ef80507889d28b2f6def4882968279a8bdbd4a05b6f8a1d95cfdbe0a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    84KB

    MD5

    0cdf7330177319c35cd9c5bcb949a63d

    SHA1

    3f1b7dccd5213d0e76b26f08f3f9af054463e3ce

    SHA256

    27353f3025cf2979fc3dfbf6e3459fbaa1eae6f9d33971bcc2e6d301214d33b5

    SHA512

    634f51955d415f15a75400527331d85fe43af4814fa35f45e5d62b03b8ec943d8f3438f89690e91c061dac6581c54cd12b4c6188fd4c8ae720b7f6a829fec034