Analysis

  • max time kernel
    119s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 05:48

General

  • Target

    6e40c69df39df76a43b80c028adb37c545dabe414f2251ccb4d41598735fd1c5N.exe

  • Size

    56KB

  • MD5

    838adfc84f9287ed9913cd152dab44d0

  • SHA1

    5274287038a5dcc36263e72939b28b9bc82688a6

  • SHA256

    6e40c69df39df76a43b80c028adb37c545dabe414f2251ccb4d41598735fd1c5

  • SHA512

    85dda45008e80b3f93613411c56cf75d9549facaa3817be7cb6577c0471871f3f4d605ea8bfbae794699cfa42bd5d828bc4cff0145bee8d75675c06c5b387992

  • SSDEEP

    768:W7Blp2sspARFbhVgNNHpQRNHpQRxRYstRYsI+PeZjN:W7Z2sspApctpQRtpQRxRYstRYsbeZjN

Score
9/10

Malware Config

Signatures

  • Renames multiple (3248) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e40c69df39df76a43b80c028adb37c545dabe414f2251ccb4d41598735fd1c5N.exe
    "C:\Users\Admin\AppData\Local\Temp\6e40c69df39df76a43b80c028adb37c545dabe414f2251ccb4d41598735fd1c5N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4177215427-74451935-3209572229-1000\desktop.ini.tmp

    Filesize

    56KB

    MD5

    d0427543d24b112959d85597c147b5c3

    SHA1

    65fe18e228fe2f537357ba204af30f13941f96d3

    SHA256

    a914aa141d4c87fe70ab3151862d3fb920d3a8c4997cfbd27cd490da1bd7a992

    SHA512

    9208f346f1b26f05176b15aa3383a983bf3ce874e4ff311403a3e016cd9d6c0ad88fca13246e39f2196234c033eec78b8fb530f4f1e98b26ab5ad1627e59765e

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    65KB

    MD5

    b18826a46aa0a0a3e698960ddc47bd56

    SHA1

    422fca2dfebce2ccc9171e3afd09931d7a848d36

    SHA256

    616ef11763da75d3a67ee218a2dee100ec51732d051351dac8e78dd8445d02f8

    SHA512

    547794f6ba8d23235b2523d84f38497254c184d2e8635f28dceb16a65ef5bef78243e46ab33bf733bbfb130041e4b5ec5bc30b60ec7ffa2a9f5ffed1b1415818