Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 06:15

General

  • Target

    97a87ded589580ad28622b82b580c505430ee90149eba68a73ef7480bfce665dN.exe

  • Size

    44KB

  • MD5

    00ae76062e5f702b3a1990e21bca74e0

  • SHA1

    0e444aa68e131f393b2dddd992ca9fb7716823fe

  • SHA256

    97a87ded589580ad28622b82b580c505430ee90149eba68a73ef7480bfce665d

  • SHA512

    d63151accd6ad7e6025325096ea5dc2412258739db2210a8cdae0b565e24417a485d9d7ac0d68e2b927657ffeb32070d9f8bb6f2d4b27ed797476cf029a23539

  • SSDEEP

    768:W7Blp2sspARFbh5YSfff9n1oXKCqzEIn1oXKCqzEy7UP9Pv:W7Z2sspAp5YSfffR7s

Score
9/10

Malware Config

Signatures

  • Renames multiple (3412) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\97a87ded589580ad28622b82b580c505430ee90149eba68a73ef7480bfce665dN.exe
    "C:\Users\Admin\AppData\Local\Temp\97a87ded589580ad28622b82b580c505430ee90149eba68a73ef7480bfce665dN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-312935884-697965778-3955649944-1000\desktop.ini.tmp

    Filesize

    44KB

    MD5

    17ed56606ac83c2f88ae4cef3a58ba6e

    SHA1

    f9eff84f909dc866605c80281093181121a30b9f

    SHA256

    1d557dc1fc759836b71b2486b8b9f8b87597deafd83bad238a1e3df8c02000d3

    SHA512

    b6a9ffd5053256fbeba6636ae313f383542bfc0f0179c8236f37193e762c954d4ad74c9056a107a5ff8f3d3d1a57bd355425dcb9e5f833e519a590887b9e0d36

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    53KB

    MD5

    e3ef953256cf5dee64b97bee58f47cd2

    SHA1

    396965e1f89daa88521e830f56f48a535faa058f

    SHA256

    605e991704164716967633a8fcda3422aa9cf3195aeeac2b3adb3e9afd264813

    SHA512

    e0dfb34fe3debc9befed271d3c956959c510bd64e8b4ef5d48319bffa3c192d50608797c233572f069a637f49b416024079b56cb055e233747b702cf00468639