Analysis

  • max time kernel
    120s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:15

General

  • Target

    363eec866503e318a054ca9d0d137c97aecd030278e413b51afdffc1806eb18bN.exe

  • Size

    111KB

  • MD5

    9c60ff6882b0263603d507d9b144e6d0

  • SHA1

    2159f48c3c654e82f6ff38bb846af7ff21a082ad

  • SHA256

    363eec866503e318a054ca9d0d137c97aecd030278e413b51afdffc1806eb18b

  • SHA512

    3a2cf04fc897528f2a331cb5c73719bf701276af8516a1302227000aff43a9ea41f16fe4e31fa88076c15b6caf71227204becebd44ab828c240edfaf9fd51451

  • SSDEEP

    1536:W7ZDpApYbWjIlE77ufL2e+efZwZQ/8S/80PqPIUpCUpiPIgaYgaQ:6DWpwE7oL2e+efZwZ08i8R9Y9Q

Score
9/10

Malware Config

Signatures

  • Renames multiple (2850) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\363eec866503e318a054ca9d0d137c97aecd030278e413b51afdffc1806eb18bN.exe
    "C:\Users\Admin\AppData\Local\Temp\363eec866503e318a054ca9d0d137c97aecd030278e413b51afdffc1806eb18bN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3533259084-2542256011-65585152-1000\desktop.ini.tmp

    Filesize

    112KB

    MD5

    b063310c52036123dcb5556bb1b60802

    SHA1

    b5076f8b5388ea6ffb04e5153717cb9490b44f0f

    SHA256

    7c1601927ab7ac2f24b9f0d6a6da66eb92a98ccfac9271ff451087c5b1ad4e84

    SHA512

    70b8d8eca81a8f4c2c6b4d123a2121d81cbfc0dde3300d64f8b39b95cf9173d958c868c981c281c76f8540d5752a87eed15b2336c29c83884d5d13869a3675c0

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    120KB

    MD5

    362028022442a92d83c37e4c3bea2950

    SHA1

    eb958ba96432c5fcd8e520110511821bc2a63bf2

    SHA256

    51cea4d8615d177351f1178c569d687ae67644ff8320cbc5b4f30b56311991b7

    SHA512

    793fffa22b82e2ef2dd031b007c35a7b8087b3e7f6b56af5dfa9dfb5283ddbcc7a583ea13e8d5fe0c81b7a003a0116e21265f0b6247f207e8e93ea5446d64118