Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:03

General

  • Target

    09048bc4633299692a032e40cf8c29925ad4973fc3191ef1b70b93a9cfb5ccc8N.exe

  • Size

    90KB

  • MD5

    536c859b7bf8548f8eaf0e5cf4409c60

  • SHA1

    4b2016ce32c1b18f875e9a2eea982c895478f556

  • SHA256

    09048bc4633299692a032e40cf8c29925ad4973fc3191ef1b70b93a9cfb5ccc8

  • SHA512

    72df4077e81969e7b5ad85407e12b21fd41c4ae3d759ec4cdf8a0e865821b324707366a4463b675593dc87b2c125fbfe13cfd225348f0f97fc253dec2d64cd3e

  • SSDEEP

    1536:/7ZQpApze+eJfFpsJOfFpsJ5DQ4PN54PNrqXqo:9QWpze+eJfFpsJOfFpsJ5D7WA

Score
9/10

Malware Config

Signatures

  • Renames multiple (3490) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\09048bc4633299692a032e40cf8c29925ad4973fc3191ef1b70b93a9cfb5ccc8N.exe
    "C:\Users\Admin\AppData\Local\Temp\09048bc4633299692a032e40cf8c29925ad4973fc3191ef1b70b93a9cfb5ccc8N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

    Filesize

    90KB

    MD5

    a765a68cf393887bc6bcff4b4d252cb9

    SHA1

    79cedf757dfc75c1db7e8af13fc72fdfc42e6904

    SHA256

    49d935419f957db6dc5b68615142474eb0343e82d879b38cad03ee4d72ebae13

    SHA512

    bda7bd737c9319109cac478261d8093128f0a9f14166d60746e0954ca147609d2340eea8bc291833aaaabc55fe1f243146b9c6d10bbdef58a3eb213b24d8e631

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    99KB

    MD5

    f7a90481e5ecd0ed4071b213e8da46a6

    SHA1

    7e44281224555874e288da2defb9b6fef325f5c1

    SHA256

    6eddfe203bf7dd828d886bedcae2470657e5d87a2528bbf4b5ab299806e4021c

    SHA512

    b8d8f5e7086947ece215741b12363f94b4d9d61e19385f348053962ebaa0abb8c7fc8191bdc01186b58601a3e2734eb5a8243fcc669363b146150147a342d227

  • memory/2960-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2960-70-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB