Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 09:58

General

  • Target

    d8c83dd616a7b1b04b8a6596fa8986c1f8367460af49506e69b9d3a90d6d5323N.exe

  • Size

    43KB

  • MD5

    dedbc19e834e88aa6f08fe2b4b22cb60

  • SHA1

    51d246ec29d7b582c96e92f046009a1b22e0a226

  • SHA256

    d8c83dd616a7b1b04b8a6596fa8986c1f8367460af49506e69b9d3a90d6d5323

  • SHA512

    2cd111dc2d34b1a0bf0a2ffbcf83017cd9f5462b1ebe99053ebaa955e7deeac4e9a6afa442d718cdc9e46bb1aecda4a7d8752cbafe575c7e81731146e684e3f6

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LOl6Sl5ltj8Tu8TyNN:W7ZhA7pApM21LOA1LOl6Aj8Tu8TyNN

Score
9/10

Malware Config

Signatures

  • Renames multiple (3447) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d8c83dd616a7b1b04b8a6596fa8986c1f8367460af49506e69b9d3a90d6d5323N.exe
    "C:\Users\Admin\AppData\Local\Temp\d8c83dd616a7b1b04b8a6596fa8986c1f8367460af49506e69b9d3a90d6d5323N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:3020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

    Filesize

    43KB

    MD5

    5f75f4108666722a4312dd8e65d94211

    SHA1

    e59e6a1f90af84cfbf325efcf75731d70291f440

    SHA256

    3332711fff65c042cfc5db0b690f11b62fa618f78d150ee3f1a4ce99b7bc352c

    SHA512

    6704187f2c1c2f8f9d0b3ce13972c3fe149c6956861e507c51b61209946c584461cd046076c6abaf8926a0586b993e56cb4457daf3f6911b295b7b9327bc9091

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    52KB

    MD5

    14cc75a27e72d9b59c3aecd2ab0bf9e8

    SHA1

    03b08cdbda9e3c0bd2b9f3abf14f177a14287bba

    SHA256

    54a88944eb066a911d012d8d665b0ef3e40bff105280a3a537071756fec75b75

    SHA512

    5dd82524ade4b722d6c388d5e3c940a79ff43ba90a7414cc8b994b4b02a1628c29616c1092761586cee9a25aa94999676fc3edaf1feb598453f011ad318e305e