Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:30

General

  • Target

    c99e89eb159772d55c13c2bb33aadb50d55eaeb8f11a7c8d6771067fedf76336N.exe

  • Size

    73KB

  • MD5

    1c2f5ac2c43ff3ef54ff355e52c4e890

  • SHA1

    4fc804ec2c011d26b982f5748ded95d47500240c

  • SHA256

    c99e89eb159772d55c13c2bb33aadb50d55eaeb8f11a7c8d6771067fedf76336

  • SHA512

    51c2c31d4e3299885041677a48483c509dcf440148c4c803e4ab8f5eaa41d894f97f98eaa827aebf5954e6f835fa15d408719b4783dd7af01a870f1c0d2574d4

  • SSDEEP

    1536:W7Z2sspApkZrZ4+fU7lK1lKT8/8yNCNzdwEbdwEG:62ssWpcU7lK1lKgkG

Score
9/10

Malware Config

Signatures

  • Renames multiple (3295) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c99e89eb159772d55c13c2bb33aadb50d55eaeb8f11a7c8d6771067fedf76336N.exe
    "C:\Users\Admin\AppData\Local\Temp\c99e89eb159772d55c13c2bb33aadb50d55eaeb8f11a7c8d6771067fedf76336N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2444

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3063565911-2056067323-3330884624-1000\desktop.ini.tmp

    Filesize

    73KB

    MD5

    c94ccfbd91bd7ce19d3d09eb1f71af00

    SHA1

    e2be129802384a26d962bf4dcfbc791023ed3a71

    SHA256

    feeb2ecd17a4b77a73bacfece10aecce8a72943e2b247a89a65825c8737bb07a

    SHA512

    af8d3e4298bc588869952413570465fe2ef55b36c1887c23079009249c3f568f8bfb0d77ec303d5b8de525bfdd5092a15011d4a79341f5b1e4baf62187e67007

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    82KB

    MD5

    6839b414bcca9144c7dc4452042f69e4

    SHA1

    f74a95f5fc6d95847c952225d291fcdc95cafe0c

    SHA256

    88abb7160b354555209049af18a3f9b00f4a0e9b9366baf73e83cf4f20c96291

    SHA512

    36696dbcaf5a0fa3e6d5d2d03c52efd7e41600b920bf9f8cd1586c0a20507599982c07356ea3f67563931181dd9a527f5ea25f3287662ecb1ebde09c7a1f75cd