Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 05:36

General

  • Target

    71b4e873015eb260c01f33c7ff458632d2a972036219ccbac756521939078e90N.exe

  • Size

    102KB

  • MD5

    a3119c4d7a00d627ef15f71346803610

  • SHA1

    9505caef0f75591f87f22e1f33e0e7caadaa0626

  • SHA256

    71b4e873015eb260c01f33c7ff458632d2a972036219ccbac756521939078e90

  • SHA512

    40ed5eb01c2e9e60b1d9cb465a646890f4fed0cc54ac07ee812f2e8099a4c1e0f4f1ead9707f1fe8df53d93674467f8a058124d725f63434ddc84b848c30c2b6

  • SSDEEP

    3072:6e7WpMaxeb0CYJ97lEYNR73e+eKZHfFpsJOfFpsJ6X9:RqKvb0CYJ973e+eKZ/

Score
9/10

Malware Config

Signatures

  • Renames multiple (3073) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\71b4e873015eb260c01f33c7ff458632d2a972036219ccbac756521939078e90N.exe
    "C:\Users\Admin\AppData\Local\Temp\71b4e873015eb260c01f33c7ff458632d2a972036219ccbac756521939078e90N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2380

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    102KB

    MD5

    65ebf8822843322a42262547ad2e20ef

    SHA1

    f644e1e53368aaf7a8891405a4ad46d21cc2b318

    SHA256

    4942bd63ec4b0f3c0f8017dd01e869b25a8c12c892454cfff048d1cf25cfce84

    SHA512

    49cf572640c14ad3ad7cd09f16ef735d1ce72500d2e428c2608179e6d643a961acd029cff3aeff566f2094c167ad0a0c6d306e0f215843187f2be9c8a904676c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    111KB

    MD5

    9e94cb464a6cc463019c9bbbb20f919b

    SHA1

    f67b3313574db613974382c3d33bbc27df076883

    SHA256

    0a6e8027e949de8fea03d16efbbbd3c9fdf7e8054c114659fd5f0cdd4689408e

    SHA512

    66417e213b7f0a127da2f6260b2f0695dc98c3c0ad89d41ba6b8e1499c07227cb32e3de0261f193e0aba5aa9efa7bbff239934255ea29de1ae50a9de903e3140