Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:24

General

  • Target

    f0525fdafbf730c7120ffeecdfcecaa40ae966d163e93706f00ca1b5ab894354N.exe

  • Size

    94KB

  • MD5

    a9b41ab07014d59393a2bc93bd361890

  • SHA1

    67fb10c203b3ad4434cc39acd7f00d212cac03a6

  • SHA256

    f0525fdafbf730c7120ffeecdfcecaa40ae966d163e93706f00ca1b5ab894354

  • SHA512

    f6eac2980c3fc0fc80ecd9b053f8c56fd421a1614a18088fbf2768c972314cbe2446fbed1d12aa128d9683432cf0486d56d7fcea5c4356dd72f2a330b81403df

  • SSDEEP

    1536:W7ZhA7pApH9QHwtRF9ESWu0SWutlggalggyaRjvmujvmRzqzlmJgwmJg/SvqBSy:6e7WpHIyRF9ESWu0SWuDm841qN

Score
9/10

Malware Config

Signatures

  • Renames multiple (2895) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f0525fdafbf730c7120ffeecdfcecaa40ae966d163e93706f00ca1b5ab894354N.exe
    "C:\Users\Admin\AppData\Local\Temp\f0525fdafbf730c7120ffeecdfcecaa40ae966d163e93706f00ca1b5ab894354N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4177215427-74451935-3209572229-1000\desktop.ini.tmp

    Filesize

    95KB

    MD5

    00b3b4a2e7853863ecd71583fbdaffa9

    SHA1

    f94e5639f5c04271333629ef4aa801570ef5ef23

    SHA256

    7736e5b9b554ff1295457a14039d40f9ca0143d76232936ae5afb8e1ddecd6cd

    SHA512

    3066cab257aa22ebc8015a2983010bce43dc6d44bd1c9ceb5e4899df7c1bb2b49e2a0f0eedcf6ea4993c863af96c74fc38690fcf0afd3db857885be719fddd72

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    104KB

    MD5

    5b071ac9d121c1bb2bc044b71e75d399

    SHA1

    1dd6f81bd585fc45b48df974bf73cd9687d23967

    SHA256

    afb1d2629e6a31741f4684889554345014653488ee947fadb0f64b4be659e02e

    SHA512

    e3009a5cd85e873fbe7212cd5dfcc46c74a0761bd3e446c5133eb09d7e6e9ad7cae9601ea10f38328c78a5099d68460a416e092950ade87b2c51dac0db7fd418