Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 05:56

General

  • Target

    3da191f72c0ef62e2a542100d840b86bf3802f890be64da2db91b1b707c25712N.exe

  • Size

    76KB

  • MD5

    baabc7e20eba2946f4a9f39a1c03ab00

  • SHA1

    aec2c93d4e2a7945b8723a8e1684c82a31e39756

  • SHA256

    3da191f72c0ef62e2a542100d840b86bf3802f890be64da2db91b1b707c25712

  • SHA512

    d69d4315e9f247d9c31a0dbd0d2bddd450bedc22f12573bb44a6b68bda8b985093d11c2ddbe2737e2480f64cf5d7f3b100472be11157261aca5b1d34e15b145d

  • SSDEEP

    1536:W7ZNLpApCZrt8PWGoPWGANdN+hEwHwDvZv079Y6IY61:6NLWpCZIzjwHws2/

Score
9/10

Malware Config

Signatures

  • Renames multiple (3217) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3da191f72c0ef62e2a542100d840b86bf3802f890be64da2db91b1b707c25712N.exe
    "C:\Users\Admin\AppData\Local\Temp\3da191f72c0ef62e2a542100d840b86bf3802f890be64da2db91b1b707c25712N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3063565911-2056067323-3330884624-1000\desktop.ini.tmp

    Filesize

    77KB

    MD5

    7a16074bb102b0adf58073c52984b5aa

    SHA1

    35190da345c6bbde180abfb95d73dcc2bbd001ec

    SHA256

    1efd2e40e78552903a9e033035b5bbdc3e311b029cda28c67971b7452ae275a2

    SHA512

    cf2b13d3ec4067a47a61993f9dce3636fb376fd14fe19ef837f634f908f26b6ccc279383478d7e17b2f25607d3e0d4bd3ac3f39297313005a12e8ef8b6affd31

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    86KB

    MD5

    fabfa6d68cadb57cac7aeead8f111f66

    SHA1

    42bb823ca2e51bae18db0eb893d830cc7871cc13

    SHA256

    059bddc8e85262b350c71d55ddab9113ff96d77197a7fdf29f237fbb73430207

    SHA512

    b217c860d9bceb758a587ca47cdbd711348198d6dd02abc10dc37de70b28e1b1254aec9b8d871b72bab9c77718c518c94015551bd5caaf6c2039b2baf37b886e