Analysis

  • max time kernel
    120s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 04:53

General

  • Target

    5e3c1635333756efc3b1cad649753e175c986284f748ff5c7e72d6a854a9d2c5N.exe

  • Size

    55KB

  • MD5

    ffa8b66f8c550173b920d5657d538f40

  • SHA1

    922de8387eb272ac6232429b09ab85f1f44eb056

  • SHA256

    5e3c1635333756efc3b1cad649753e175c986284f748ff5c7e72d6a854a9d2c5

  • SHA512

    3010de950b44f6dda845b7a1d918d58d6f0cee4ec17514a77ce27229b1f5932f93c43564c04c1df18aac0b7e4f077e5a5d77848ec9c23261dd988be6031c9bd4

  • SSDEEP

    768:W7BlpppARFbhjbhg42LcfpR42LcfproFNFkTfq9Tfq7h6hWh2hQ:W7ZppApBULcfpHLcfpyDc2ih6hWh2hQ

Score
9/10

Malware Config

Signatures

  • Renames multiple (3370) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e3c1635333756efc3b1cad649753e175c986284f748ff5c7e72d6a854a9d2c5N.exe
    "C:\Users\Admin\AppData\Local\Temp\5e3c1635333756efc3b1cad649753e175c986284f748ff5c7e72d6a854a9d2c5N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

    Filesize

    55KB

    MD5

    fa9f4a86297048c98042d867b5ee18eb

    SHA1

    ec11ccc3b972dbf30d45c78d667453fb0dda67e5

    SHA256

    8d8310dd0ed5f04a46fa2b002246cb78d7a1dbc463a50aad716c1eb4abb0e623

    SHA512

    67886d9fce8fc28dabb39cb5cfb77c1a4e841ddc3d924d289435b97e6e59f630d176639c43d0ed9e2cc977f452dd48a76a8c2e735fec1c00ec5b008a061f7398

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    64KB

    MD5

    dbdd1172f6112534980317cc84170ef4

    SHA1

    7ccd2c74ad4636a697d014aaf14c0d8b97f73356

    SHA256

    4fe194c2d85635482028b861376a9afece5f9f2a14418e0599f62a3b2c625298

    SHA512

    cfb7dbf16cfd67aad376106e53cad65c1df9835e159bec246d2dbbe63d895a824f66f91fa76eaa35e6eb62477fc95f3f18ff749fe740b506931194c773616ff5