Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:10

General

  • Target

    04f84ec42382d5ab11305a0a4214a075e7946aee851c9191bbedf4f0db875567N.exe

  • Size

    41KB

  • MD5

    00d6f8025badc3d192ab7bb211b58140

  • SHA1

    2ffe3df0898aaf090b5f37e4ca2a1cd08f9a70e0

  • SHA256

    04f84ec42382d5ab11305a0a4214a075e7946aee851c9191bbedf4f0db875567

  • SHA512

    2bac5ff0e2a0cc1e04331c9137ef3f11d8b4232c19fb7d73d5546b2337a2ff0a8f1c670a47b037518d8c46dd4152a9139f72e57f7150fa67b5aeb7cba6b723c3

  • SSDEEP

    384:GBt7Br5xjL9AgA71Fbhv7bhv3KueKudLl++KDUbdz3sJ/F8gzbdz3sJ/F8gC:W7BlpppARFbhjbhPKueKudLw1Dl

Score
9/10

Malware Config

Signatures

  • Renames multiple (3739) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\04f84ec42382d5ab11305a0a4214a075e7946aee851c9191bbedf4f0db875567N.exe
    "C:\Users\Admin\AppData\Local\Temp\04f84ec42382d5ab11305a0a4214a075e7946aee851c9191bbedf4f0db875567N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3434294380-2554721341-1919518612-1000\desktop.ini.tmp

    Filesize

    41KB

    MD5

    9513e7a4ebdc8ce897f3daaa43ca0745

    SHA1

    5cdad7d1f38a7e9fe26d52b223174519546074ae

    SHA256

    195cdf7cb19824cd4d72d44b2e379f28d9c59f7f552e5be680d2c8b31f72630b

    SHA512

    67753dec2261bb46d872f4fe39d9b1a6ebf9f7cad02974502b2f9eaff81e932903f8e106d118568e11328f0b3f4ab064a50f6e9a10eb855b72793287eb1889e4

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    50KB

    MD5

    204d2f79e9c5b5a35c5f5917611ebb8a

    SHA1

    9267b536a2573e8b6c7184714a2d557c7f764737

    SHA256

    d577a0f4f20e118badbaec1ae79497649df7a918576f6281649b3dfdbfc7a199

    SHA512

    5d27a9e7d09425caf4ac72f2ad085b3a5d8b0ee7dc8300c0b64b1b1e69ccfa60082db3bcc063ea2b634e4b97869bb05205d70b96883265028525e86491facfdb