Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:44

General

  • Target

    82fc87db0281bb61a919991f63839525508af712bfe086ebddf0276809e96c27N.exe

  • Size

    80KB

  • MD5

    69ca70fcf8f9fd5f4bb84e79788d5530

  • SHA1

    c0266214067d4e1987e86cec2f22697a372d1af8

  • SHA256

    82fc87db0281bb61a919991f63839525508af712bfe086ebddf0276809e96c27

  • SHA512

    ec90e6af7204590022fdd51058973f750c7f581e0e80bfcbaf7fd420c8e087697bbc5c6a7f5385b66e77a365e89f71e3d71051cd16878bc66549816e8c47233c

  • SSDEEP

    1536:W7Z+pApfGQ3y3RWvfmRfm9sKsSd55tDYTY8:6+WpDfmRfmhJts88

Score
9/10

Malware Config

Signatures

  • Renames multiple (335) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\82fc87db0281bb61a919991f63839525508af712bfe086ebddf0276809e96c27N.exe
    "C:\Users\Admin\AppData\Local\Temp\82fc87db0281bb61a919991f63839525508af712bfe086ebddf0276809e96c27N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-457978338-2990298471-2379561640-1000\desktop.ini.tmp

    Filesize

    80KB

    MD5

    7142b737d3a4bf2343f1809a9acd4e49

    SHA1

    7820277d0e53789796554fdab67f4f4c0e710d6f

    SHA256

    b9ec26d9918ce8d7e880e9421509c787a4e142f47284aaf4013e8ca65e4fa4e6

    SHA512

    240552592e2f98ebe333e8b0ac90cc637df558436a057a1693bb2826fca3127895ae1d0bfc9453141d27829905169c22bf2e3ddc9b141b41d835f75ce29bced0

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    89KB

    MD5

    28f74ea3e5b8656de6087516f53c17aa

    SHA1

    57fff376cc9c3318150dad566bacff3f1dc25ef5

    SHA256

    e4d9972ad6efbd0b9735640886c2fc2d5753cf2d3f048d1cfd06c504f2cc29f5

    SHA512

    5998844c58ef22e695ef42d5e14d710fd98c9e69365911bca846c687ce0f06864343ec36c05fe03dc5053c7f62218c08b356cfc790857dd324b4f4165d4dead7