Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 05:03

General

  • Target

    9c4d8d7aa65b89f9dd2e2835a5b9e1f254357f7fdba1a7ace24e9e8e73767fdeN.exe

  • Size

    91KB

  • MD5

    531d7f5190d3999a2c5c1a49b4c2ff10

  • SHA1

    2e2b068cfd119f4e6e26eec345fc241f86c9faa2

  • SHA256

    9c4d8d7aa65b89f9dd2e2835a5b9e1f254357f7fdba1a7ace24e9e8e73767fde

  • SHA512

    5fdc2928b8eb7f6cad7b2b068add22a90fc321854824d7e08487eb06363bbb8b67e8df6e7541db19800148685ce09ea80657df5d877c716f1f6f59e79a31b227

  • SSDEEP

    1536:/7ZQpApze+eJfFpsJOfFpsJ5DQ4PN54PNy5vC5vk:9QWpze+eJfFpsJOfFpsJ5D7W82c

Score
9/10

Malware Config

Signatures

  • Renames multiple (3131) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9c4d8d7aa65b89f9dd2e2835a5b9e1f254357f7fdba1a7ace24e9e8e73767fdeN.exe
    "C:\Users\Admin\AppData\Local\Temp\9c4d8d7aa65b89f9dd2e2835a5b9e1f254357f7fdba1a7ace24e9e8e73767fdeN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2224

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini.tmp

    Filesize

    91KB

    MD5

    e52d57d463961c15d2a83b9cc8ef0b5b

    SHA1

    bb9bce51cb4829bb8f0c83c9e4387b6af6698ef1

    SHA256

    00803db56ac2391cce36a48a06adea0ba70aaf8d72715831a0b6acff5a64a847

    SHA512

    7d3467f9539138cfb06d096f049be6d28b260e35049b0d0a34f8f4080b35f29f76927df297bffb30fa7845230238a8cf5c97c550b5c0e3c54fe3830c479f3051

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    100KB

    MD5

    3c0481d3bad6414650cb99bf13220b21

    SHA1

    a7809e2d6676b87336d5822d999573e22f5bcc47

    SHA256

    f850a06755f6cdb56b165c0c27ce89ad7f81878f8321fb10651dd80b6e5284cf

    SHA512

    795e3bca5dd4c19aec99bd46d7f8a392607b0b688008ac216181e025a7ec85ba2c3acfe59993bcf3aa73b0236459c1025d8228e0f3a3ce3eb54ade4ba7b8edc5

  • memory/2224-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2224-74-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB