Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:56

General

  • Target

    990750e3e5bcce6fe7f2a6e4318f1812af340aeab905ed7fe4fa28e0cc9c3039N.exe

  • Size

    83KB

  • MD5

    dfd022bfb692a8b7a4996e26822a6310

  • SHA1

    91795ee40b59f054b6fa179b6053e55bb025ce23

  • SHA256

    990750e3e5bcce6fe7f2a6e4318f1812af340aeab905ed7fe4fa28e0cc9c3039

  • SHA512

    3d0a3e1e3652a831788acdb5690489ff56c8792c2fd2b45532781f7cae89ed750b83150ff81c2210c3ab2e8400e9010715f27dd35a76b9897638fba43b36cd39

  • SSDEEP

    768:W7Blp+pARFbhtlmlQ3y3RWvf+wi1x9f+wi1xBTCcX8vgCcX8vSd5hdx8O/Gum/Gt:W7Z+pApfGQ3y3RWvfmRfm9sKsSd5Nkk

Score
9/10

Malware Config

Signatures

  • Renames multiple (3262) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\990750e3e5bcce6fe7f2a6e4318f1812af340aeab905ed7fe4fa28e0cc9c3039N.exe
    "C:\Users\Admin\AppData\Local\Temp\990750e3e5bcce6fe7f2a6e4318f1812af340aeab905ed7fe4fa28e0cc9c3039N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2276

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3063565911-2056067323-3330884624-1000\desktop.ini.tmp

    Filesize

    83KB

    MD5

    16a10d1b0732400251cca302a5af1e03

    SHA1

    e7b1326a4441a79d0bfc03a68c8a381f96628cbc

    SHA256

    403193e9f813f6618874d561930dc2aac4878ce4d6a0a7feb33ac24017c907d8

    SHA512

    2f918fde120f81bdd0bb95b8fb05e0435840c4ffbc450b597f3fd66d75dcdf7488213c56bf93ac6a8b56868171990efe0f35ec45b3c768f5eba5dd2ec80f7872

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    92KB

    MD5

    0a52850c3808c40a50d12cc3f3f071b3

    SHA1

    425a909fa2a3126e92a2fadeacd67b1e07062cae

    SHA256

    7ad000bbdc974ecbfc0c92f80a74a1183c4c1b16a068c7bdb022c958ea84bb7d

    SHA512

    d72a8df1521b4ecd6481cc0e92adff822b81d63f86d7e4ed7f1db730ee3cd3db3c359167d35da1a9da9e6f8f2de2e7cd40c8c26e076897add8857d9f58169dd1