Analysis

  • max time kernel
    150s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 05:40

General

  • Target

    a43690b827c347e3c78257759faae8317a0c27992d5cea7d8d9bb255f64e04bdN.exe

  • Size

    48KB

  • MD5

    6360f7f944daae7ea0b2f7e9f5c1fb80

  • SHA1

    2183f86ad1fe46428e76a1c2b52de5039c743d4a

  • SHA256

    a43690b827c347e3c78257759faae8317a0c27992d5cea7d8d9bb255f64e04bd

  • SHA512

    966f37a9c5804b70d78268b63cba355b236838a85757106551440c8954f27180d2fb5abd5764838c166a91060d40147710e0aa40cfe94cc779568efa93b167fb

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LORWAnWAkpUE5c5gSCFJFK:W7ZhA7pApM21LOA1LOrtkpt6af4

Score
9/10

Malware Config

Signatures

  • Renames multiple (4073) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a43690b827c347e3c78257759faae8317a0c27992d5cea7d8d9bb255f64e04bdN.exe
    "C:\Users\Admin\AppData\Local\Temp\a43690b827c347e3c78257759faae8317a0c27992d5cea7d8d9bb255f64e04bdN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:376

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini.tmp

    Filesize

    48KB

    MD5

    47bea9571f60ca9547c9d852906f3b7a

    SHA1

    6a258f7377a09347320c3f666cf3ce4123b65691

    SHA256

    f9894d85f31a4bbe3c8896b5afdda55eca17653774b59611e5cee8de3aa2953b

    SHA512

    cd4293fe3d2ebd6edea404c3086a06edeedfdafa64cf0ac4bddd402c4cb607af2c52093edbc16b345b24c18319080fed7ffcbe34062dd0ff63fb857988308e83

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    57KB

    MD5

    41b8fb9eff87f6a2e9c70d48e786ca25

    SHA1

    7f7c3191fc0ebf3eea398928b69e93cdfeb73be2

    SHA256

    763abaf0723a94751addb8355fd95f57f7b9602e57644a82a8856eaa1111a750

    SHA512

    353a2ec298c05dc771dbace75a1459b6205f2ed62f3e8c1ab2bfd0416c785b49c1a2e4ec9c77d830df0a3895bd1bbceb483f0f1a21d776c1db4d1e5cf7f62b7f