Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 22:42

General

  • Target

    169e3e1461f58408044b5f7bc91bcb0ead42921af088f5525f2e252e16875984N.exe

  • Size

    44KB

  • MD5

    d0a18230b15a41e71312ae2e2cce74e0

  • SHA1

    c70305d70a54f44da14ee5b95e5617c1155d0bad

  • SHA256

    169e3e1461f58408044b5f7bc91bcb0ead42921af088f5525f2e252e16875984

  • SHA512

    0943bed59f8f58c6dbb49bf9044824e140a599858cc3e2f768c59a57b0987f4fee1539486fb4f4950577794efce002e96bf7eed28c4cfc73d5d7b762c347a788

  • SSDEEP

    384:yBs7Br5xjL8AgA71Fbhv/F1Ue8FnpfaKaxGnpfaKaxNmP9Pb:/7BlpQpARFbhzUe8HaKa4aKaKP9Pb

Score
9/10

Malware Config

Signatures

  • Renames multiple (3771) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\169e3e1461f58408044b5f7bc91bcb0ead42921af088f5525f2e252e16875984N.exe
    "C:\Users\Admin\AppData\Local\Temp\169e3e1461f58408044b5f7bc91bcb0ead42921af088f5525f2e252e16875984N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2180

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1846800975-3917212583-2893086201-1000\desktop.ini.tmp

          Filesize

          45KB

          MD5

          a48c15c4b6de51dc61cd11926cd627e6

          SHA1

          d13154dee4a3cdb2f2530a8978da47ba2c3c0708

          SHA256

          91c0cd3cb69b7f9fa4a6a7ee6aa16b587842140942e4000c5572af5f1b0458be

          SHA512

          0cf2a5bd3f69bceab8422c319bad2ac7887bb35f47236bbb3243dc74f40ab5bb6f433a0af7f60dfa04f2bbdd4d9794ef166acfc7af5b0ec95593ee2135f27d1e

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          54KB

          MD5

          3a1827508dc14212e4538c5edd4edb35

          SHA1

          380d92c9a1b57fdf83587e598b13f377c829c37c

          SHA256

          6a9825799a3b77be38a1651152f723715ac1e3dd18ba998b573b6be3f2420051

          SHA512

          5330bc2517a3c5d400076dc9dce6fc0d7461ed7001b4bfa98c1187f754255e54fe4afcc4eccec5ee88c51febd5bc0247ce0ade327d4ef93a694807af5430f1ed

        • memory/2180-0-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/2180-74-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB