Analysis

  • max time kernel
    120s
  • max time network
    14s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 04:03

General

  • Target

    64c21d73cbdfaaff800edb029422cd496c76ea9829e5cff2f57de5d8b703158aN.exe

  • Size

    44KB

  • MD5

    edd944a5ac2a89833a8ecded908ab950

  • SHA1

    f0d3774d7d7769fe7395ceb0ed302ce7c95a2148

  • SHA256

    64c21d73cbdfaaff800edb029422cd496c76ea9829e5cff2f57de5d8b703158a

  • SHA512

    35ab2158cb30ec61d3f8c4caf3aaf908f650e1cf29c34902e08f6a4fc12408511124b2fd2c29ec4e5d99500fe96e667340b99e2d42540217487925c660aedae1

  • SSDEEP

    768:W7BlphA7pARFbhM0Kkq81LOyq81LORWAnWAkpUE5c5gSup:W7ZhA7pApM21LOA1LOrtkpt6I

Score
9/10

Malware Config

Signatures

  • Renames multiple (3338) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\64c21d73cbdfaaff800edb029422cd496c76ea9829e5cff2f57de5d8b703158aN.exe
    "C:\Users\Admin\AppData\Local\Temp\64c21d73cbdfaaff800edb029422cd496c76ea9829e5cff2f57de5d8b703158aN.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1506706701-1246725540-2219210854-1000\desktop.ini.tmp

    Filesize

    44KB

    MD5

    9c97f06d219e8563cf7ffc2e88a97ef1

    SHA1

    6ddca23e141e4286d99490dd63273423f0496d24

    SHA256

    3982d6db87309cd220f153396d3f4856ed472f0bc4fbcf05d3b0ceedbd50b6c9

    SHA512

    e35136f666f6ad15801579f8b500189b6f328aa06d2c12c25ce8d88908f5974da0bf0c7b0aaf5d8faad0927647499b57ab3f8c4c13f839dc60e4f1146bbae2ae

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    53KB

    MD5

    07de4714666e2284f76dbad37f1f336e

    SHA1

    556270a0ad6793253087e6b0b6efc39b34d9aac9

    SHA256

    1e2f8a75473b688a495cf9800e6e086e998ebf852bec6d8a5c7be127f9469ffa

    SHA512

    9007db6154dade511cddb5b88a6a3c8623f3a65722947b09fd2ead9999b2cbb52a48ba9bcd721d1c136f71e1898a5d9941024a7151b684905d1e313900c5c5c6