Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-09-2024 22:02

General

  • Target

    06fd4084f85935216b821bf9eb235210971585619482f578121ee8c7b1bc9117N.exe

  • Size

    32KB

  • MD5

    e7f1b05e8b0e7a834946a10640d582e0

  • SHA1

    4eae5a5bd9ee18a427927b52d65f737d3b084ae3

  • SHA256

    06fd4084f85935216b821bf9eb235210971585619482f578121ee8c7b1bc9117

  • SHA512

    68cd803bbf5c0b5cb1730306244f4637225df31bf8bdc29dcc5b81e325d7fa88d5a51c8938c5eb755706edea92b26feb7240c05967394a6611773fafe777fa40

  • SSDEEP

    192:tACUADIY0Br5xjL/ScAgAQmP1oynLb22vtPeGyvyq1iGyvyqkErB7rBYRvLdvLWE:GBt7Br5xjLfAgA71FbhvtPcIxk

Score
9/10

Malware Config

Signatures

  • Renames multiple (3358) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\06fd4084f85935216b821bf9eb235210971585619482f578121ee8c7b1bc9117N.exe
    "C:\Users\Admin\AppData\Local\Temp\06fd4084f85935216b821bf9eb235210971585619482f578121ee8c7b1bc9117N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:1800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-312935884-697965778-3955649944-1000\desktop.ini.tmp

    Filesize

    33KB

    MD5

    8915a333b8c9faa4efbcce2b50c4d07e

    SHA1

    03f223f9ebbaae2a714269b687d7239da56738a7

    SHA256

    1e075c8957629d0c3e24450c63b0e6a0fc25c75e622ce33741a46d14f0258b57

    SHA512

    0de8e33c3469d8c805e939d17fa7586c34098c7cdfdc1522b346b1ba34e9d4e9a92095d4a08edc5b73cf757745838b2282b9de812d7e99d175465c95dc11f33f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    41KB

    MD5

    5200dada9128a4c0e83a5c02063b87ad

    SHA1

    2a769209f2471edf1b1e5269d91c941202950305

    SHA256

    2e3d6123b29f9a12a05d57385961eb5bfe012523ae9e23954d2a2d75bb820fb1

    SHA512

    86b2e740969f7ec5c374062deff8527ad8be81ad479a211ad1505a5c309668b72da13ec4dbf86932c2565d644bb80feb2aa24fa06762782955c12402f19eeaa2