Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2024, 22:39

General

  • Target

    60a65e2c75e6f6c0b908fa4a5cb82d9847a6c6b9565c9bf59aa27e258e3e0361N.exe

  • Size

    46KB

  • MD5

    f6b24d7a2eaa40f4e7f8b225ab76da10

  • SHA1

    7b4149b13be9a6d1d05dc3571fbab40d54660271

  • SHA256

    60a65e2c75e6f6c0b908fa4a5cb82d9847a6c6b9565c9bf59aa27e258e3e0361

  • SHA512

    97d8062550296c0d97daef72eec041ada14087b072a5f779a401f48f0d889e5b89a13ba8aaf6af9287fdcbe1ba680e6b5f5ec3f9217ed964c3d9196a369d1406

  • SSDEEP

    384:yBs7Br5xjL8AgA71Fbhv/FzzwzBnLLnLd7Mn3:/7BlpQpARFbhNIZPi

Score
9/10

Malware Config

Signatures

  • Renames multiple (3305) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\60a65e2c75e6f6c0b908fa4a5cb82d9847a6c6b9565c9bf59aa27e258e3e0361N.exe
    "C:\Users\Admin\AppData\Local\Temp\60a65e2c75e6f6c0b908fa4a5cb82d9847a6c6b9565c9bf59aa27e258e3e0361N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2280

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3551809350-4263495960-1443967649-1000\desktop.ini.tmp

          Filesize

          46KB

          MD5

          f3ff2884b358dbefd90d9075d5cf80aa

          SHA1

          407ea61686d0fb6c0b84e2abe7a4c8b94fc1f70d

          SHA256

          338ed80ce9ca884734745dd0b2e130112f645a65eccf1fb35892ef6c5df88c9c

          SHA512

          d805538fc39022be83755654852cc0e1d7ea997389cd4bdafbe691611f9d9e2ad5cf603428e24c60e769784e98aafd44c313d68b0f5d93566e55bcf665731fe9

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          55KB

          MD5

          f3f4602267f8b572299ca2acae25a6c3

          SHA1

          f7f049708f9b5a7bbdd7b93267a2ebae19e50f84

          SHA256

          70aeb38e102675e7cfe52d345d2583e91234e68fc5a8048fd5d324f5e5e5cb83

          SHA512

          be8fea7b4826fb1a09acb247a78ea7f01b63b58fdecb7c4d1dbb4041b92014dba758dec41d779a4f5d6b12cef77b027e47125e03166c2dd70cdbd6e93c0fcfde

        • memory/2280-0-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/2280-72-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB