Analysis

  • max time kernel
    120s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2024 01:44

General

  • Target

    1c27913392513bbe71c54189f9301377a103523c11ea613b816523d172bef22cN.exe

  • Size

    44KB

  • MD5

    3ecfc45f37409b65a251eb1fe12a2c10

  • SHA1

    e018eb1a9a22c81e966014e05bb5ea519b715d05

  • SHA256

    1c27913392513bbe71c54189f9301377a103523c11ea613b816523d172bef22c

  • SHA512

    fded218798fea7f8a1ab41204a6e7f43c19c23c7796663ba3f7eb2a08b2edd295a8d3f88ba699e18a45920723d2f5b810cda883d4ca33a341daf3ed207fe35ce

  • SSDEEP

    384:GBt7Br5xjLdbAAgA71FbhvU8g0U0fL+8t8YwTZjiKemTiKema0v0C:W7Blp+pARFbhBgnKL+8t8NZEm0mXcC

Score
9/10

Malware Config

Signatures

  • Renames multiple (3417) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c27913392513bbe71c54189f9301377a103523c11ea613b816523d172bef22cN.exe
    "C:\Users\Admin\AppData\Local\Temp\1c27913392513bbe71c54189f9301377a103523c11ea613b816523d172bef22cN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1488793075-819845221-1497111674-1000\desktop.ini.tmp

    Filesize

    44KB

    MD5

    8c437fbe7195ded24f60baebfb5c2b5f

    SHA1

    5a555115cb64d0912ce78f8f010583413cd3e14d

    SHA256

    afd1a107d6c8a2dce5d070768d1cf1e5092c9e78499bb8cd6d6dadc9e1a7a9f3

    SHA512

    548213b90dc48ea97d0969fb3a3d6b69a292aafa6e0672dd723284449d515401c41ce21f1158f6144a8f43bbf83c74154a2d211dc191bdd9d809016f6d12bbf6

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    53KB

    MD5

    6f5be5a2b37598583f511974ee6f18eb

    SHA1

    bc3e5def491ab5036939db5dd897c78e8ff2831f

    SHA256

    753dba4ac1fb17a3843b0c0e9fca31bec82429ebc9ea932f32440bb38da8f15c

    SHA512

    72556f37ed906f730506e1adf5bece960dc987c0a91ae4199213fbc982d86fcb41b9722b4a6ffc98791d4ae7597a3d816e73792f58892554c285e3780fd6c708